4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1026.293865][ T3212] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 11:26:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1026.381836][ T3212] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1026.446272][ T3212] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1026.565104][ T3249] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:13 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) ioctl$GIO_CMAP(r0, 0x542f, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 11:26:13 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0xff, @broadcast, 0x4e20, 0x0, 'lc\x00', 0x2, 0x1}, {@private=0xa010100, 0x4e26, 0x0, 0x81, 0xffffffff}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x1, 'syzkaller1\x00', {}, 0xe5}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x100, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8400fffffffb) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:26:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1026.772831][ T7] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FIONREAD(r1, 0x541b, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 11:26:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) 11:26:13 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1027.109375][ T3281] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1027.143516][ T3279] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 9806) 11:26:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) [ 1027.153416][ T3279] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 1, start 0001010a) [ 1027.163713][ T3279] FAT-fs (loop3): Filesystem has been set read-only 11:26:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:13 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{&(0x7f00000002c0)=@qipcrtr, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/149, 0x95}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x15) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x1}, 0x8) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 1027.449404][ T3304] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1027.526223][ T3303] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:14 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1027.959666][ T3279] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 9806) 11:26:14 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x13, 0x2}, {@empty, 0x0, 0x0, 0xfffffffd, 0x0, 0x8}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r3, r1, 0x0, 0xa198) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x4200, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:14 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x123041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x59}, @rumble}) write$evdev(r0, &(0x7f0000000040), 0x2b8) [ 1028.065527][ T3279] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 1, start 0001010a) [ 1028.101999][ T3279] FAT-fs (loop3): Filesystem has been set read-only 11:26:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1028.237049][ T3344] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) setresgid(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) 11:26:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:14 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{&(0x7f00000002c0)=@qipcrtr, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/149, 0x95}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x15) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x1}, 0x8) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 11:26:15 executing program 5: r0 = memfd_create(&(0x7f0000000040)='4\xacXrcO\b\xc4ut/eve\x94\xa1m\x1e\x12\x8ai,\xbeTnt#\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46000000d2000000000001000003003e0000001000000000000000000040000000000000000000000000000000000000100000380002"], 0x44) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 11:26:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:15 executing program 5: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=<r0=>0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/fib_triestat\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff}) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0x40000900000c4) mmap$qrtrtun(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x11, r1, 0x0) 11:26:15 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1029.015433][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:15 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00270d00"/20, @ANYRES32], 0x84}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1029.285416][ T3400] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:15 executing program 5: pipe(&(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x4240a2a0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000d5000000d50000000a000000000000000000000300000000040000000400000036"], &(0x7f0000000000)=""/182, 0xfa, 0xb6, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x800, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) bind(r3, &(0x7f0000000180)=@l2={0x28, 0x0, @none}, 0x80) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r4, 0x5437, 0xfffffffe) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000280)=0x5) r5 = dup(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000240), 0x8) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000200)) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x41d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}, 0x24) [ 1029.340723][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 1029.340740][ T29] audit: type=1804 audit(1594898775.815:3132): pid=3396 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/812/bus" dev="sda1" ino=15950 res=1 11:26:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:15 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{&(0x7f00000002c0)=@qipcrtr, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/149, 0x95}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x15) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x1}, 0x8) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 1029.435897][ T3405] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.0'. 11:26:16 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000280)=""/227, 0xe3, r3}}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x4200, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1029.618210][ T29] audit: type=1804 audit(1594898775.815:3133): pid=3361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/812/bus" dev="sda1" ino=15950 res=1 11:26:16 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1029.706034][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1029.961513][ T3435] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1029.989052][ T29] audit: type=1804 audit(1594898776.005:3134): pid=3400 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/773/file0/bus" dev="loop2" ino=952 res=1 11:26:16 executing program 5: pipe(&(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x4240a2a0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000d5000000d50000000a000000000000000000000300000000040000000400000036"], &(0x7f0000000000)=""/182, 0xfa, 0xb6, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x800, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) bind(r3, &(0x7f0000000180)=@l2={0x28, 0x0, @none}, 0x80) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r4, 0x5437, 0xfffffffe) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000280)=0x5) r5 = dup(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000240), 0x8) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000200)) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x41d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}, 0x24) 11:26:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1030.119152][ T29] audit: type=1804 audit(1594898776.365:3135): pid=3427 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/813/bus" dev="sda1" ino=16382 res=1 [ 1030.198317][ T3436] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) setresgid(0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) [ 1030.348898][ T29] audit: type=1804 audit(1594898776.815:3136): pid=3455 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/774/bus" dev="sda1" ino=16383 res=1 11:26:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:17 executing program 4: mkdir(0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680)="62f23e748cdfecc0d3bcb88248f9f8f8e8ba030000000000001dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a30142ee9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffd92, 0xb6}], 0x80000, 0x0) [ 1030.603634][ T29] audit: type=1804 audit(1594898776.995:3137): pid=3425 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/813/file0" dev="sda1" ino=15951 res=1 11:26:17 executing program 5: getpgid(0x0) pipe(&(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x4240a2a0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/182, 0xfa, 0xb6, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) bind(r3, &(0x7f0000000180)=@l2={0x28, 0x0, @none}, 0x80) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r4, 0x5437, 0xfffffffe) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000280)=0x5) r5 = dup(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000240), 0x8) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000200)) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x41d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800}}, 0x24) 11:26:17 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)=0x1) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1030.876469][ T29] audit: type=1804 audit(1594898777.005:3138): pid=3462 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/813/file0" dev="sda1" ino=15951 res=1 11:26:17 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1031.098707][ T29] audit: type=1804 audit(1594898777.055:3139): pid=3462 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/813/bus" dev="sda1" ino=16382 res=1 11:26:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', <r1=>0x0}) r2 = socket(0x11, 0x800000003, 0x0) dup(r2) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="256b94507fb1"}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 11:26:17 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000480)='\"', 0x1}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffb) [ 1031.185906][ T29] audit: type=1804 audit(1594898777.295:3140): pid=3464 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/813/bus" dev="sda1" ino=16382 res=1 [ 1031.318038][ T3496] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1031.363541][ T29] audit: type=1804 audit(1594898777.835:3141): pid=3491 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/814/bus" dev="sda1" ino=15968 res=1 [ 1031.431615][ T3495] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:18 executing program 0: getpgid(0x0) pipe(0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) ioctl$GIO_CMAP(r0, 0x5405, &(0x7f0000000200)) 11:26:18 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000000}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{&(0x7f00000002c0)=@qipcrtr, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/149, 0x95}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x15) syz_genetlink_get_family_id$nl80211(0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x35, 0x1}, 0x8) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 11:26:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4$packet(r0, 0x0, 0x0, 0x0) 11:26:18 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:18 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x40000001, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100), 0x8) close(0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={<r1=>0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x40000900000c4) 11:26:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1032.320484][ T248] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1032.329702][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:26:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1032.465584][ T3555] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:19 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) [ 1032.511692][ T3559] splice read not supported for file /3558/auxv (pid: 3559 comm: syz-executor.5) [ 1032.524005][ T3561] splice read not supported for file /3558/auxv (pid: 3561 comm: syz-executor.5) 11:26:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:19 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x5, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="4c0000000206010400000000000000000000000005000400000000000900020073797a300000000005000500000000000500010006000000120003006269746d61703a69702c6d6163000000e97892dce25b1994b4c88943ce2322964d2311e9513ec75dec4a9c76560a1c1e5ef37284cc57bfe51e4eca61bdeec04c0e5dd545b479ca5ebc916084f724a370a26bf4145cfda55c46ebbaf40c8b96b294f7b53c9477719ae36d5f6701198340b3485253651723fcba42d25187a6461edb0174ec0c5fe1ba04551206e5ad03b725a431d48acc9eb468424c21133421c3315976"], 0x4c}}, 0x0) ioctl$HIDIOCSREPORT(0xffffffffffffffff, 0x400c4808, &(0x7f0000000480)={0x1, 0x2, 0x401}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f00000003c0)) sched_setscheduler(0x0, 0x3, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3bb8387b04e2f61e, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x1ba, &(0x7f0000000000)=[{}]}, 0x10) 11:26:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1032.769302][ T248] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:26:19 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="72617755a6f768000000000000000000000000000000000000000000000000000200000003000000d801000098000000000000009800000098000000000000004001000040010000400100004001000040010000030000000000000000000000000000000000000000000000000000000000000000000000002e000000000000000000000200000000000000000000000000000000000000000000000000000000000000120000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000a80000000000000000000000000000000000000000003800534554000000000000000001000000000000000000000000000000000003ffff0000ffff0000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000600000000000000000000000000002800000000000000000000000000550000000000000000000000000000000000feffffff"], 0x1) 11:26:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1033.050770][ T3590] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1033.171845][ T3588] debugfs: Directory '3588-4' with parent 'kvm' already present! 11:26:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:19 executing program 5: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000000000)) semctl$GETALL(0x0, 0x0, 0xd, 0x0) 11:26:19 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x100000000, 0x0, &(0x7f0000000000), 0x1d0802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000002c0)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000280)=0x14) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:20 executing program 4: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000900)=ANY=[@ANYBLOB="380000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000001800128008000100736974000c00028008000100", @ANYRES32=r3, @ANYBLOB="964ed2b1b56ffd20b1b74e3136a9c877cd603edf5c4a1648b436091154cac798fc92bc4f43862a852789c4e73f995ede5f9e4865577295c66a46f1d02e0c5ab78df4bb8d7658c148d3ce7b52e5000800006ff0cfecc37498305092cb985baa991077891ee855afb1be134bfe6b152a263732f76b980f796f75c960d75fb3dceabb754bd0735f9cfd6269c3187dea483ae510287eef0f89b5ca30b3cc52ebf2eb3c67f93c0d38778b8879eeb6525bd95873d6f44b230b39f601a28ccb751edda2275942cc3c705f6254941191890363b4b47ade4e2de556da33decf04de87c2287fd4f38d566d6405ec3bbac29b38d3a4b9af387a7568498e07cef37297f9dc8c9ba3f9feccefa348364c4058ca2f58a2b76fe94cf569736eeeff9f07a44f6e1fac9deafcdab48bb928f71029c699ec00e63bd5430490043a8a1b25aa50172e26635af6c1721e08d37d997d57dff1701281ef2d94199259b36cd8d5050e06eaaa63874908f75b53add06988871380b3f3baa62b6947e131654ac6fb1818261dd612e4cee74ecb5cfbccad7e10ce82d4fcfebbafdc1fee92c48abdd647854482c2d802de4b38385d742789d30db5cd253c7c5ee65756c9946c33fc4a27ed1bc8b19e106ea248074f90c5c078428770ebbefbf264992df45b44ab5487087cabdf9713b58de4ef79d3029fc775b02e59ee9ab4ff118603e218f331a36f999ffeabd4307a1f5bab1c2baf8c4d8aae64b364da15a84a693e1937f3a13e5173ce6dc35fd16f73a8884d9ef32220d41b9b0aae9202bcf0d2c087f60ad8cc5d30721ef7c0a5df585acbd387aee1f9949d58ac8be3bba8b1b767b1dc38c6bc376406d8eb361f65489fb4"], 0x38}}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @multicast}, 0x10) fchmodat(0xffffffffffffffff, &(0x7f00000003c0)='./bus\x00', 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4048010}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x44, 0xf, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x20000000) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nf_conntrack\x00') openat$vcs(0xffffff9c, 0x0, 0x88000, 0x0) sendfile(r4, r6, 0x0, 0x80000005) [ 1033.543974][ T3617] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 11:26:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:20 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:20 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x5, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1ba, &(0x7f0000000000)=[{}]}, 0x10) 11:26:20 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x5, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$HIDIOCSREPORT(0xffffffffffffffff, 0x400c4808, &(0x7f0000000480)={0x1, 0x2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1ba, &(0x7f0000000000)=[{}]}, 0x10) [ 1033.696781][ T248] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1033.969535][ T3638] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1034.403336][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 1034.403353][ T29] audit: type=1804 audit(1594898780.875:3162): pid=3625 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/816/file0" dev="sda1" ino=15966 res=1 11:26:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1034.605006][ T29] audit: type=1804 audit(1594898780.875:3163): pid=3625 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/816/file0" dev="sda1" ino=15966 res=1 11:26:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x1, 0x0, 0x1000}], 0x1) 11:26:21 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1034.698945][ T248] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:21 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={<r5=>0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x6, 0x118, 0xfa00, {{0x9, 0x7b87, "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", 0x8, 0x1f, 0x0, 0xc1, 0x3f, 0x5d, 0x1}, r5}}, 0x120) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) getsockopt$inet_int(r1, 0x0, 0x32, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x4a6001, 0x0) 11:26:21 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}, {{{0x9, 0x5, 0x81, 0x3, 0x8}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001300)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="002205"], 0x0}, 0x0) syz_usb_ep_write(r0, 0x0, 0xbc, &(0x7f00000001c0)="8ac757c1c5c86a3dc584046289797b1e4123ebbd04d8a58b9e7d11ce224c3cce4683671deb729e31249c9b297d76019cb3e19e968e19f63f192af1080a3f97cbcac8a22c2b3e80a5699c50ffc871d699a72554d47cae91c25aee3e665346cbdad79ae97380ae246a3cd5380c273d03b6be746238ce8d040a096525665464c10a216ec0ace9ba02246c940cce68963649ee8854488be308000000000000000fb07c64092ec079db4f11504485f029883764ac54df6035d7059ce00843") 11:26:21 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x3000009, 0x10032, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x49, 0x0, 0x0) r5 = dup2(r4, r3) dup3(r5, r2, 0x0) [ 1034.788372][ T29] audit: type=1804 audit(1594898780.915:3164): pid=3645 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/816/bus" dev="sda1" ino=15753 res=1 [ 1034.875123][ T29] audit: type=1804 audit(1594898781.195:3165): pid=3625 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/816/bus" dev="sda1" ino=15753 res=1 11:26:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1034.918250][ T29] audit: type=1804 audit(1594898781.195:3166): pid=3652 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/816/bus" dev="sda1" ino=15753 res=1 [ 1034.950590][ T3670] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:21 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x9, 0x10}, 0xc) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1035.107604][ T29] audit: type=1804 audit(1594898781.575:3167): pid=3678 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/817/bus" dev="sda1" ino=15822 res=1 [ 1035.140318][ T8204] usb 1-1: new high-speed USB device number 6 using dummy_hcd 11:26:21 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x5, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) sched_setscheduler(0x0, 0x0, &(0x7f00000003c0)) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1ba, &(0x7f0000000000)=[{}]}, 0x10) [ 1035.284664][ T29] audit: type=1804 audit(1594898781.615:3168): pid=3670 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/779/bus" dev="sda1" ino=15737 res=1 11:26:21 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) move_mount(r6, &(0x7f0000000100)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x75) 11:26:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1035.432125][ T29] audit: type=1804 audit(1594898781.635:3169): pid=3671 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/817/bus" dev="sda1" ino=15822 res=1 11:26:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1035.580835][ T8204] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1035.604451][ T8204] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 1035.613645][ T29] audit: type=1804 audit(1594898781.675:3170): pid=3678 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/817/file0" dev="sda1" ino=15996 res=1 [ 1035.667981][ T8204] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 11:26:22 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 1035.734311][ T29] audit: type=1804 audit(1594898781.685:3171): pid=3671 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/817/file0" dev="sda1" ino=15996 res=1 [ 1035.735877][ T8204] usb 1-1: config 0 descriptor?? 11:26:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1036.328214][ T3729] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1036.392372][ T8204] keytouch 0003:0926:3333.0006: fixing up Keytouch IEC report descriptor [ 1036.467210][ T8204] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.0006/input/input2914 [ 1036.558159][ T8204] keytouch 0003:0926:3333.0006: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 1037.352023][T31495] usb 1-1: USB disconnect, device number 6 [ 1038.103162][T31495] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1038.490845][T31495] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1038.509549][T31495] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 1038.521661][T31495] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1038.532896][T31495] usb 1-1: config 0 descriptor?? 11:26:25 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xc}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 11:26:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) process_vm_writev(0x0, &(0x7f00000021c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002400)=[{&(0x7f0000002200)=""/165, 0xa5}, {0x0}, {&(0x7f00000023c0)=""/47, 0x2f}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000017c0), 0x1c1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f0000000000)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x11c, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x64, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2d8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0xa4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff6a1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe41}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000840}, 0x4040) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x6, 0x101100) 11:26:25 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x4, &(0x7f0000000100)=[{0x1000, 0x7, 0x20, 0x7f}, {0x1000, 0x0, 0x81, 0xff}, {0xff, 0x9, 0x3, 0x7e000}, {0x1ff, 0x7f, 0x39, 0x8001}]}, 0x10) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:25 executing program 5: r0 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x5, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) sched_setscheduler(0x0, 0x0, &(0x7f00000003c0)) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1ba, &(0x7f0000000000)=[{}]}, 0x10) 11:26:25 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1038.870166][T31495] usbhid 1-1:0.0: can't add hid device: -71 [ 1038.876383][T31495] usbhid: probe of 1-1:0.0 failed with error -71 [ 1038.922372][ T3778] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1038.968871][T31495] usb 1-1: USB disconnect, device number 7 11:26:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190d09004beaff0d8c560284476080ffe0064e2000005900f4a1bc5603ca00000f7f897af9ce132be0762100200000000101ff000000ec00ff0000dfb817476150f4", 0x48}], 0x1) 11:26:25 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x9, 0x10}, 0xc) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) 11:26:26 executing program 4: open$dir(&(0x7f0000000100)='./file1\x00', 0x86e0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4) [ 1039.597449][ T3807] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1039.685961][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1039.686025][ T29] audit: type=1804 audit(1594898786.155:3183): pid=3816 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/819/file0" dev="sda1" ino=16028 res=1 11:26:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000540)={@broadcast, @local, @val, {@ipv4}}, 0x0) 11:26:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:26 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000002000)={@broadcast, @local={[], 0xffffffffffffffff}, @val, {@ipv6}}, 0x0) 11:26:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000400)=""/250, 0xfa}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000180)=""/42, 0x2a}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000880)=[{&(0x7f0000000200)=""/107, 0x6b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e0057f) shutdown(r2, 0x0) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r4, 0x0) accept4(r4, &(0x7f0000000040)=ANY=[], &(0x7f0000001080), 0x0) r5 = dup2(r3, r2) shutdown(r5, 0x0) [ 1039.945711][ T29] audit: type=1804 audit(1594898786.205:3184): pid=3796 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/819/file0" dev="sda1" ino=16028 res=1 11:26:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000340)=""/58, 0x3a}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000017c0)=[{&(0x7f0000000380)=""/142, 0x8e}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00588) shutdown(r3, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r5, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r4, 0x0) 11:26:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1, 0x0, 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000600)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e005a8) shutdown(r2, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000100), 0x8) shutdown(r3, 0x0) [ 1040.152939][ T29] audit: type=1804 audit(1594898786.205:3185): pid=3796 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/819/file0" dev="sda1" ino=16028 res=1 11:26:26 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x9, 0x10}, 0xc) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) [ 1040.282166][ T29] audit: type=1804 audit(1594898786.215:3186): pid=3807 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/782/file0/bus" dev="sda1" ino=16003 res=1 [ 1040.307174][ T29] audit: type=1804 audit(1594898786.225:3187): pid=3796 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/819/bus" dev="sda1" ino=16113 res=1 [ 1040.333183][ T29] audit: type=1804 audit(1594898786.365:3188): pid=3816 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/819/bus" dev="sda1" ino=16113 res=1 11:26:26 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1040.373039][ T29] audit: type=1804 audit(1594898786.365:3189): pid=3826 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/819/bus" dev="sda1" ino=16113 res=1 [ 1040.404355][ T29] audit: type=1800 audit(1594898786.665:3190): pid=3825 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16027 res=0 11:26:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:27 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) dup3(r1, r0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x9, 0x10}, 0xc) ftruncate(r2, 0x600004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) dup(0xffffffffffffffff) [ 1040.746242][ T3875] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1040.979357][ T29] audit: type=1804 audit(1594898787.445:3191): pid=3875 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/783/file0/bus" dev="sda1" ino=16021 res=1 11:26:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1, 0x0, 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000600)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e005a8) shutdown(r2, 0x0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 11:26:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f00000002c0)=[{&(0x7f0000000340)=""/58, 0x3a}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/125, 0x73}], 0x1000000000000312) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00588) shutdown(r3, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r5, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r4, 0x0) 11:26:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1, 0x0, 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000600)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e005a8) shutdown(r2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 11:26:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1, 0x0, 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000600)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e005a8) shutdown(r2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, &(0x7f0000000100), 0x8) shutdown(r3, 0x0) 11:26:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:28 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1041.822729][ T3941] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1041.990625][ T29] audit: type=1804 audit(1594898788.455:3192): pid=3944 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/784/file0/bus" dev="loop2" ino=961 res=1 11:26:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1, 0x0, 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000600)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e005a8) shutdown(r2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f00000000c0)={0x7}, &(0x7f0000000100), 0x8) shutdown(r3, 0x0) 11:26:28 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:28 executing program 5: r0 = socket(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=@in6={0x1c, 0x1c}, 0x1c) 11:26:28 executing program 0: [ 1042.228348][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:28 executing program 4: 11:26:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:28 executing program 0: [ 1042.428597][ T3977] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:29 executing program 5: 11:26:29 executing program 4: 11:26:29 executing program 4: ppoll(0x0, 0x0, &(0x7f0000000040), &(0x7f000079dff8), 0xffffffffffffff0e) 11:26:29 executing program 5: [ 1042.913463][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:29 executing program 3: 11:26:29 executing program 0: 11:26:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:29 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:29 executing program 4: 11:26:29 executing program 5: 11:26:29 executing program 0: 11:26:29 executing program 4: 11:26:29 executing program 5: 11:26:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1043.240068][ T4007] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:29 executing program 0: 11:26:29 executing program 3: 11:26:29 executing program 5: 11:26:30 executing program 4: 11:26:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:30 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:30 executing program 5: 11:26:30 executing program 3: 11:26:30 executing program 0: 11:26:30 executing program 4: 11:26:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1043.816042][T31745] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:30 executing program 0: 11:26:30 executing program 4: 11:26:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:30 executing program 3: 11:26:30 executing program 5: 11:26:30 executing program 0: [ 1044.106702][ T4043] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:30 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:30 executing program 4: 11:26:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:30 executing program 3: 11:26:30 executing program 5: 11:26:30 executing program 0: [ 1044.434108][T31745] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:31 executing program 3: 11:26:31 executing program 0: 11:26:31 executing program 5: 11:26:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:31 executing program 4: 11:26:31 executing program 3: [ 1044.688788][ T4065] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1044.905467][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1044.905485][ T29] audit: type=1804 audit(1594898791.375:3196): pid=4072 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/788/file0/bus" dev="loop2" ino=969 res=1 11:26:31 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) 11:26:31 executing program 3: 11:26:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:31 executing program 5: 11:26:31 executing program 4: [ 1045.113785][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:31 executing program 3: 11:26:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:31 executing program 5: 11:26:31 executing program 4: 11:26:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:31 executing program 5: [ 1045.391950][ T4093] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1045.569711][ T29] audit: type=1804 audit(1594898792.035:3197): pid=4097 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/789/file0/bus" dev="loop2" ino=971 res=1 11:26:32 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1045.881597][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1046.009342][ T4105] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:32 executing program 0: 11:26:32 executing program 3: 11:26:32 executing program 4: 11:26:32 executing program 5: 11:26:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1046.174908][ T29] audit: type=1804 audit(1594898792.645:3198): pid=4105 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/790/file0/bus" dev="loop2" ino=973 res=1 11:26:32 executing program 0: 11:26:32 executing program 3: 11:26:32 executing program 5: 11:26:32 executing program 4: 11:26:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:32 executing program 0: 11:26:33 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:33 executing program 5: 11:26:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:33 executing program 4: 11:26:33 executing program 3: 11:26:33 executing program 0: [ 1046.692884][ T248] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:33 executing program 5: 11:26:33 executing program 3: 11:26:33 executing program 4: 11:26:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:33 executing program 5: 11:26:33 executing program 0: [ 1046.925917][ T4142] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1047.130811][ T29] audit: type=1804 audit(1594898793.605:3199): pid=4147 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/791/file0/bus" dev="loop2" ino=975 res=1 11:26:33 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:33 executing program 5: 11:26:33 executing program 3: 11:26:33 executing program 4: 11:26:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:33 executing program 0: [ 1047.258693][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:33 executing program 4: 11:26:33 executing program 5: 11:26:33 executing program 3: 11:26:33 executing program 0: 11:26:34 executing program 4: [ 1047.658299][ T29] audit: type=1804 audit(1594898794.125:3200): pid=4168 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/792/bus" dev="sda1" ino=15783 res=1 11:26:34 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:34 executing program 3: 11:26:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:34 executing program 5: 11:26:34 executing program 0: 11:26:34 executing program 4: 11:26:34 executing program 3: 11:26:34 executing program 4: 11:26:34 executing program 0: 11:26:34 executing program 5: 11:26:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:35 executing program 4: [ 1048.687224][ T4191] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1048.839382][ T29] audit: type=1804 audit(1594898795.305:3201): pid=4194 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/793/file0/bus" dev="loop2" ino=977 res=1 11:26:35 executing program 3: 11:26:35 executing program 0: 11:26:35 executing program 5: 11:26:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:35 executing program 4: 11:26:35 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:35 executing program 0: [ 1049.028488][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:35 executing program 3: 11:26:35 executing program 5: 11:26:35 executing program 4: 11:26:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:35 executing program 0: [ 1049.280006][ T4210] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1049.452476][ T29] audit: type=1804 audit(1594898795.925:3202): pid=4218 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/794/file0/bus" dev="loop2" ino=979 res=1 11:26:36 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x800) 11:26:36 executing program 3: 11:26:36 executing program 4: 11:26:36 executing program 5: getpgid(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000d5000000d50000000a000000000000000000000300000000040000003600000000f650346595a4f889263f0817717b5492656247cdcf169cc5dcf59af91770fe8ff72ff206462f9d02"], &(0x7f0000000000)=""/182, 0xfa, 0xb6, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) bind(0xffffffffffffffff, &(0x7f0000000180)=@l2={0x28, 0x0, @none}, 0x80) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x5437, 0xfffffffe) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000280)=0x5) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), 0x8) ioctl$GIO_CMAP(r1, 0x4b70, 0x0) 11:26:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:26:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1049.560353][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b66, 0x73e000) 11:26:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "001700011f00000100"}) read(r0, &(0x7f0000001340)=""/102400, 0x19000) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCFLSH(r2, 0x540a, 0x2) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 11:26:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:36 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1049.794583][ T4239] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1049.864793][ T4244] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:36 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1049.986680][ T29] audit: type=1804 audit(1594898796.455:3203): pid=4246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/795/file0/bus" dev="loop2" ino=982 res=1 [ 1050.071224][ T29] audit: type=1804 audit(1594898796.545:3204): pid=4252 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir673632280/syzkaller.j3uibr/937/file0/bus" dev="loop4" ino=983 res=1 11:26:36 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 11:26:36 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1050.299210][T31745] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0fffffff (sector = 1) [ 1050.300623][ T4259] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1050.422131][ T4263] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1050.554510][ T29] audit: type=1804 audit(1594898797.025:3205): pid=4262 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/807/file0/bus" dev="loop5" ino=986 res=1 11:26:37 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1050.642897][T31745] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1050.707950][ T4271] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1050.759085][ T29] audit: type=1804 audit(1594898797.195:3206): pid=4268 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir856216956/syzkaller.2CdnUO/1226/file0/bus" dev="loop0" ino=987 res=1 11:26:37 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x84, @multicast2, 0x0, 0x10000000, 'lc\x00', 0x0, 0x1}, {@empty, 0x0, 0x0, 0x2}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1050.870022][ T29] audit: type=1804 audit(1594898797.335:3207): pid=4271 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/796/file0/bus" dev="sda1" ino=15737 res=1 11:26:37 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1050.936540][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1051.150256][ T4287] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1051.276596][ T4291] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1051.306393][ T29] audit: type=1804 audit(1594898797.775:3208): pid=4290 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/844/bus" dev="sda1" ino=16371 res=1 11:26:37 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1051.433984][T31745] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1051.503324][ T29] audit: type=1804 audit(1594898797.835:3209): pid=4292 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir673632280/syzkaller.j3uibr/938/bus" dev="sda1" ino=16369 res=1 [ 1051.778699][ T29] audit: type=1804 audit(1594898797.845:3210): pid=4287 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir673632280/syzkaller.j3uibr/938/bus" dev="sda1" ino=16369 res=1 [ 1051.957820][ T29] audit: type=1804 audit(1594898798.145:3211): pid=4304 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/808/file0/bus" dev="sda1" ino=15787 res=1 [ 1052.066987][ T4311] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:38 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x131800) write$P9_RXATTRWALK(r6, &(0x7f0000000280)={0xf, 0x1f, 0x1, 0x400}, 0xf) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) 11:26:38 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 11:26:38 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:38 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1052.283766][ T29] audit: type=1804 audit(1594898798.755:3212): pid=4311 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir856216956/syzkaller.2CdnUO/1227/file0/bus" dev="sda1" ino=15782 res=1 [ 1052.303779][ T4318] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1052.316988][ T4317] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1052.850918][ T4337] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:39 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:39 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}]}, 0x20}}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) 11:26:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:39 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:39 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x131800) write$P9_RXATTRWALK(r6, &(0x7f0000000280)={0xf, 0x1f, 0x1, 0x400}, 0xf) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) [ 1053.511330][ T4355] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1053.545936][ T4361] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1053.553840][ T4356] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:40 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) 11:26:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1054.199698][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:40 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:40 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000100)=0xf1, &(0x7f0000000280)=0x2) 11:26:40 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1054.384094][ T21] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1054.533679][ T4389] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1054.557434][ T4390] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1054.574869][ T4394] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1054.630952][ T4403] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:41 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) r6 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x131800) write$P9_RXATTRWALK(r6, &(0x7f0000000280)={0xf, 0x1f, 0x1, 0x400}, 0xf) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) [ 1055.111673][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1055.111692][ T29] audit: type=1804 audit(1594898801.585:3224): pid=4409 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir856216956/syzkaller.2CdnUO/1229/file0/bus" dev="sda1" ino=16075 res=1 11:26:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:41 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) 11:26:42 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x6, 0x0, 0x6, 0x800, 0x2}, 0x14) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r3, r2, 0x0, 0xa198) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x4200, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:42 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000100)=0x44) [ 1055.534691][ T29] audit: type=1804 audit(1594898802.005:3225): pid=4417 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/847/bus" dev="sda1" ino=16030 res=1 11:26:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:42 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1055.701553][ T4424] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1055.847297][ T29] audit: type=1804 audit(1594898802.315:3226): pid=4424 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/811/file0/bus" dev="sda1" ino=15789 res=1 [ 1055.875708][ T4438] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1056.057884][ T4447] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1056.335256][ T4452] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1056.375414][ T29] audit: type=1804 audit(1594898802.845:3227): pid=4450 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir856216956/syzkaller.2CdnUO/1230/file0/bus" dev="loop0" ino=993 res=1 11:26:43 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) 11:26:43 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000100)=0x44) [ 1056.525373][ T29] audit: type=1804 audit(1594898802.845:3228): pid=4438 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/800/file0/bus" dev="sda1" ino=16368 res=1 11:26:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:43 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x38, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}]}, 0x38}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:43 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1056.717733][ T29] audit: type=1804 audit(1594898803.185:3229): pid=4452 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir673632280/syzkaller.j3uibr/942/file0/bus" dev="sda1" ino=16376 res=1 [ 1056.810169][ T21] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1056.859387][ T4464] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1056.865086][ T4468] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1057.073791][ T29] audit: type=1804 audit(1594898803.545:3230): pid=4472 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/812/file0/bus" dev="loop5" ino=995 res=1 11:26:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:43 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x10401, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000280)={0x1, 0x2, [], [@padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0x9}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}, 0x20) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x4200, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1057.396149][ T29] audit: type=1804 audit(1594898803.795:3231): pid=4464 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/801/file0/bus" dev="sda1" ino=16102 res=1 [ 1057.505888][ T29] audit: type=1804 audit(1594898803.955:3232): pid=4485 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/848/bus" dev="sda1" ino=15787 res=1 [ 1057.587491][ T4493] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:44 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000100)=0x44) [ 1057.767928][ T29] audit: type=1804 audit(1594898804.075:3233): pid=4477 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir856216956/syzkaller.2CdnUO/1231/bus" dev="sda1" ino=16373 res=1 11:26:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:44 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1057.981763][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:44 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:44 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x38, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}]}, 0x38}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1058.186710][ T4509] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1058.209451][ T4505] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:44 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100), 0x8) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)='veth0_to_team\x00') r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1058.425400][ T4515] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1058.437217][T31745] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:45 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1058.947677][ T4533] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1059.009195][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:45 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1059.394913][ T4545] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:46 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x38, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}]}, 0x38}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1059.654702][ T4555] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1059.704361][ T4561] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:46 executing program 4: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:46 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:46 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:47 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1060.545575][ T123] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:47 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1060.697101][ T4586] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1060.707627][ T4588] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1060.793800][ T4601] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1060.936087][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 1060.936139][ T29] audit: type=1804 audit(1594898807.405:3244): pid=4588 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/815/file0/bus" dev="sda1" ino=16382 res=1 [ 1061.022753][ T4608] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:47 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1061.294191][ T29] audit: type=1804 audit(1594898807.425:3245): pid=4610 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir856216956/syzkaller.2CdnUO/1234/file0/bus" dev="loop0" ino=1003 res=1 11:26:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1061.437946][ T4620] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1061.544124][ T29] audit: type=1804 audit(1594898807.465:3246): pid=4606 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/815/file0/bus" dev="sda1" ino=16382 res=1 11:26:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(0x0, 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1061.640491][ T123] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:48 executing program 4: syz_emit_ethernet(0x1de, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2c, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:48 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:48 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1061.748480][ T29] audit: type=1804 audit(1594898807.585:3247): pid=4586 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir673632280/syzkaller.j3uibr/945/file0/bus" dev="sda1" ino=15778 res=1 [ 1061.792482][ T29] audit: type=1804 audit(1594898807.675:3248): pid=4605 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/851/bus" dev="sda1" ino=16101 res=1 [ 1061.933259][ T29] audit: type=1804 audit(1594898807.825:3249): pid=4608 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/804/file0/bus" dev="sda1" ino=16379 res=1 11:26:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1062.050962][ T4638] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1062.065260][ T29] audit: type=1804 audit(1594898808.105:3250): pid=4620 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/816/file0/bus" dev="sda1" ino=15890 res=1 [ 1062.156228][ T4646] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1062.197029][ T29] audit: type=1804 audit(1594898808.465:3251): pid=4637 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/852/bus" dev="sda1" ino=15690 res=1 11:26:48 executing program 4: syz_emit_ethernet(0x1de, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2c, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:48 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1062.413083][ T29] audit: type=1804 audit(1594898808.875:3252): pid=4646 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/805/file0/bus" dev="loop2" ino=1005 res=1 11:26:49 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(0xffffffffffffffff, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:49 executing program 4: syz_emit_ethernet(0x1de, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2c, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1062.538370][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:49 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(0xffffffffffffffff, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1062.741857][ T4666] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:49 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1062.864495][ T4671] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1062.877575][ T4672] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1063.022401][ T29] audit: type=1804 audit(1594898809.495:3253): pid=4680 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/817/file0/bus" dev="sda1" ino=15967 res=1 11:26:49 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:26:49 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 11:26:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:49 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 11:26:49 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1063.504535][ T4698] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:50 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:50 executing program 4: syz_emit_ethernet(0x1de, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2c, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:50 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:50 executing program 4: syz_emit_ethernet(0x1de, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2c, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1063.873372][ T4711] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:50 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:50 executing program 4: syz_emit_ethernet(0x1de, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2c, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x0, [0x0, 0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:50 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:51 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1064.550871][ T123] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:51 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:51 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment]}}}}}}}, 0x0) 11:26:51 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:51 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:51 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:51 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment]}}}}}}}, 0x0) 11:26:51 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:51 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:51 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) 11:26:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:51 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment]}}}}}}}, 0x0) [ 1065.044755][ T4768] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:51 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:51 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}]}]}}}}}}}, 0x0) 11:26:51 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) 11:26:51 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:51 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) 11:26:52 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 1065.527957][ T248] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:26:52 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:52 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:52 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}]}]}}}}}}}, 0x0) 11:26:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1065.882854][ T4817] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1066.067521][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1066.067539][ T29] audit: type=1804 audit(1594898812.535:3262): pid=4822 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/820/file0/bus" dev="loop5" ino=1011 res=1 11:26:52 executing program 0: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:52 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) 11:26:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:52 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}]}]}}}}}}}, 0x0) 11:26:52 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:52 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1066.259162][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:26:52 executing program 4: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:52 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:53 executing program 0: getpgid(0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 11:26:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:53 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:26:53 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) 11:26:53 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 1066.661566][ T29] audit: type=1804 audit(1594898813.125:3263): pid=4845 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/821/bus" dev="sda1" ino=15767 res=1 11:26:53 executing program 0: getpgid(0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 11:26:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:53 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:26:53 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 11:26:53 executing program 0: getpgid(0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 11:26:53 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:53 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:26:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:53 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:53 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 11:26:53 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 11:26:53 executing program 0: getpgid(0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:54 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:26:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:54 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1067.580854][ T4895] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:54 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) [ 1067.777954][ T29] audit: type=1804 audit(1594898814.245:3264): pid=4905 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/822/file0/bus" dev="loop5" ino=1013 res=1 11:26:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:26:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:54 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:26:54 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:54 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:54 executing program 3: getpgid(0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:54 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x73, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896cef7236"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:26:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1068.445666][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:55 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:55 executing program 4: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:26:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) [ 1068.744104][ T4948] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1069.069380][ T29] audit: type=1804 audit(1594898815.535:3265): pid=4957 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/823/file0/bus" dev="sda1" ino=16163 res=1 11:26:56 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:56 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:56 executing program 4: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:56 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:26:56 executing program 4: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:56 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1069.809145][ T4985] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1070.011113][ T29] audit: type=1804 audit(1594898816.485:3266): pid=4997 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/824/file0/bus" dev="loop5" ino=1015 res=1 11:26:57 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:57 executing program 4: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:57 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:26:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 1070.649203][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:26:57 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:57 executing program 4: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1070.978111][ T5026] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:58 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:26:58 executing program 4: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:58 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1071.837523][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:58 executing program 4: syz_emit_ethernet(0x19e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x168, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x24, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x3a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605a"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:58 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1072.054611][ T5062] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:58 executing program 4: syz_emit_ethernet(0x19e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x168, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x24, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x3a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605a"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:58 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:58 executing program 4: syz_emit_ethernet(0x19e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x168, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x24, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x3a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605a"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:58 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1072.338543][ T123] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:58 executing program 2: getpgid(0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:58 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x57, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1072.551097][ T5099] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:26:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:59 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x57, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:26:59 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:26:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:26:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:26:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:26:59 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x57, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:26:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 1073.410560][ T123] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:00 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x65, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d8"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1073.601451][ T5151] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1073.817725][ T29] audit: type=1804 audit(1594898820.285:3267): pid=5163 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/828/file0/bus" dev="loop5" ino=1023 res=1 11:27:00 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:00 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x65, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d8"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:00 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x65, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d8"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1074.433454][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:01 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1074.697649][ T5203] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1074.868170][ T29] audit: type=1804 audit(1594898821.335:3268): pid=5203 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/829/file0/bus" dev="loop5" ino=1025 res=1 11:27:01 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 11:27:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:01 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1074.970594][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 11:27:01 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1075.198136][ T5230] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) [ 1075.348279][ T29] audit: type=1804 audit(1594898821.815:3269): pid=5249 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/830/file0/bus" dev="loop5" ino=1027 res=1 11:27:01 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:01 executing program 4: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 11:27:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) [ 1075.476199][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:02 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) [ 1075.725531][ T5271] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1075.870826][ T29] audit: type=1804 audit(1594898822.345:3270): pid=5283 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/831/file0/bus" dev="loop5" ino=1029 res=1 11:27:02 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:02 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:02 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 11:27:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1076.542943][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:03 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1076.683123][ T5313] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 11:27:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1076.829314][ T29] audit: type=1804 audit(1594898823.295:3271): pid=5319 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/832/file0/bus" dev="loop5" ino=1031 res=1 11:27:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:03 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:03 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:03 executing program 0: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 11:27:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1077.532684][ T123] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:04 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:04 executing program 0: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:04 executing program 0: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1077.753365][ T5360] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1077.946229][ T29] audit: type=1804 audit(1594898824.415:3272): pid=5372 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/833/file0/bus" dev="loop5" ino=1033 res=1 11:27:05 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:05 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:05 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1078.587119][ T190] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 11:27:05 executing program 4: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:05 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 11:27:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1078.748803][ T5393] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:05 executing program 4: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1078.885995][ T29] audit: type=1804 audit(1594898825.355:3273): pid=5397 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/834/file0/bus" dev="loop5" ino=1035 res=1 11:27:05 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:05 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1079.090947][ T190] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:05 executing program 4: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:05 executing program 3: getpgid(0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) [ 1079.325656][ T5427] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:05 executing program 0: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1079.461286][ T29] audit: type=1804 audit(1594898825.935:3274): pid=5435 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/835/file0/bus" dev="loop5" ino=1037 res=1 11:27:06 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:06 executing program 4: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1079.532889][ T29] audit: type=1804 audit(1594898825.975:3275): pid=5427 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/835/file0/bus" dev="loop5" ino=1037 res=1 11:27:06 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1079.639915][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:06 executing program 4: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:06 executing program 0: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:06 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1079.848078][ T5456] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:06 executing program 4: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1080.063693][ T29] audit: type=1804 audit(1594898826.535:3276): pid=5466 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/836/file0/bus" dev="loop5" ino=1039 res=1 11:27:06 executing program 0: syz_emit_ethernet(0x1d6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x1a0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x0, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment]}}}}}}}, 0x0) 11:27:06 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:07 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:07 executing program 4: syz_emit_ethernet(0x176, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x140, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1f, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x5e, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3f"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment]}}}}}}}, 0x0) 11:27:07 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1080.703693][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x38, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment]}}}}}}}, 0x0) 11:27:07 executing program 4: syz_emit_ethernet(0x176, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x140, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1f, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x5e, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3f"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:07 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1080.938310][ T5509] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1081.190342][ T29] audit: type=1804 audit(1594898827.655:3277): pid=5520 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/837/file0/bus" dev="sda1" ino=15752 res=1 11:27:08 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:08 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}]}]}}}}}}}, 0x0) 11:27:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:08 executing program 4: syz_emit_ethernet(0x176, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x140, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1f, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x5e, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3f"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:08 executing program 3: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x5437, 0xfffffffe) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:08 executing program 4: syz_emit_ethernet(0x1a6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x170, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x25, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x8d, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:08 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000280)='./file0/file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/154) shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x4000) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0xe4081, 0x0) ftruncate(r3, 0x1) 11:27:08 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}]}]}}}}}}}, 0x0) 11:27:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1081.927739][ T5547] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1082.172664][ T29] audit: type=1804 audit(1594898828.646:3278): pid=5559 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/838/file0/bus" dev="loop5" ino=1041 res=1 [ 1082.265333][ T29] audit: type=1804 audit(1594898828.656:3279): pid=5561 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/838/file0/bus" dev="loop5" ino=1041 res=1 [ 1082.435269][ T29] audit: type=1804 audit(1594898828.906:3280): pid=5563 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/900/bus" dev="sda1" ino=16373 res=1 11:27:09 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) lseek(0xffffffffffffffff, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:09 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}]}]}}}}}}}, 0x0) 11:27:09 executing program 4: syz_emit_ethernet(0x1a6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x170, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x25, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x8d, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1082.760706][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:09 executing program 4: syz_emit_ethernet(0x1a6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x170, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x25, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x8d, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:09 executing program 2: getpgid(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:09 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xfffffffe, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) write(r0, &(0x7f0000000280)="8f9a051ce8c2dc0efe88c70fc52e57284c3276cc82e80905a37166fe", 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r3, r2, 0x0, 0xa198) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x4200, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:09 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:27:09 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:09 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xa4, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4d"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1083.124057][ T5598] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1083.321106][ T5607] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1083.384669][ T29] audit: type=1804 audit(1594898829.856:3281): pid=5610 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/839/file0/bus" dev="loop5" ino=1043 res=1 [ 1083.506290][ T29] audit: type=1804 audit(1594898829.886:3282): pid=5603 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/901/bus" dev="sda1" ino=15772 res=1 11:27:10 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:10 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:27:10 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xa4, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4d"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:10 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1084.007510][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:10 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:27:10 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xa4, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4d"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1084.293287][ T5632] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1084.315619][ T29] kauditd_printk_skb: 2 callbacks suppressed 11:27:10 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1084.315637][ T29] audit: type=1804 audit(1594898830.786:3285): pid=5626 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/902/bus" dev="sda1" ino=16381 res=1 11:27:10 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb0, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:11 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:27:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1084.608170][ T29] audit: type=1804 audit(1594898831.016:3286): pid=5632 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/840/file0/bus" dev="loop5" ino=1045 res=1 11:27:11 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:11 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb0, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:11 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:27:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:11 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1085.099505][ T5652] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1085.129460][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1085.291557][ T29] audit: type=1804 audit(1594898831.766:3287): pid=5657 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/856/file0/bus" dev="loop2" ino=1047 res=1 11:27:11 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x70, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad586696896c"}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}]}]}}}}}}}, 0x0) 11:27:11 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb0, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1085.532209][ T5667] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1085.726584][ T29] audit: type=1804 audit(1594898832.196:3288): pid=5667 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/841/file0/bus" dev="sda1" ino=16110 res=1 11:27:12 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, 0x0, 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:12 executing program 0: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:12 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb6, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1085.838075][ T29] audit: type=1804 audit(1594898832.236:3289): pid=5673 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/903/bus" dev="sda1" ino=15757 res=1 [ 1085.863343][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1086.272378][ T5691] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:12 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:12 executing program 0: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:12 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb6, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:13 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:13 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb6, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:13 executing program 0: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1086.572696][ T29] audit: type=1804 audit(1594898833.046:3290): pid=5691 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/857/file0/bus" dev="sda1" ino=16384 res=1 11:27:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1086.742310][ T5710] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1086.847658][ T29] audit: type=1804 audit(1594898833.316:3291): pid=5717 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/842/file0/bus" dev="loop5" ino=1049 res=1 [ 1086.980385][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1087.108479][ T29] audit: type=1804 audit(1594898833.576:3292): pid=5721 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/904/bus" dev="sda1" ino=16179 res=1 11:27:13 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, 0x0, 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x38, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}]}, 0x38}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:13 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb9, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:13 executing program 0: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:13 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x82) sendfile(0xffffffffffffffff, r1, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1087.359453][ T5731] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:13 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb9, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:13 executing program 0: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1087.544881][ T29] audit: type=1804 audit(1594898834.016:3293): pid=5731 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/843/file0/bus" dev="sda1" ino=16180 res=1 11:27:14 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:14 executing program 0: syz_emit_ethernet(0x166, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x130, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1d, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:14 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb9, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1088.004905][ T5747] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1088.225379][ T29] audit: type=1804 audit(1594898834.696:3294): pid=5747 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/858/file0/bus" dev="loop2" ino=1051 res=1 11:27:14 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, 0x0, 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x38, 0x0, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}]}, 0x38}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:14 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x82) sendfile(0xffffffffffffffff, r1, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:14 executing program 0: syz_emit_ethernet(0x19e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x168, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x24, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x38, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:14 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xba, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1088.338284][T31745] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:15 executing program 0: syz_emit_ethernet(0x19e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x168, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x24, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x38, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1088.676072][ T5770] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:15 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xba, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1088.735392][ T5772] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:15 executing program 0: syz_emit_ethernet(0x19e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x168, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x24, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x38, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:15 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:15 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xba, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:15 executing program 0: syz_emit_ethernet(0x1b6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x180, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x27, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x54, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:15 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x82) sendfile(0xffffffffffffffff, r1, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:15 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1089.187583][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:15 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:15 executing program 0: syz_emit_ethernet(0x1b6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x180, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x27, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x54, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1089.340112][ T5799] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1089.456769][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1089.456787][ T29] audit: type=1804 audit(1594898835.926:3300): pid=5810 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/906/file0" dev="sda1" ino=16370 res=1 11:27:16 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1089.543847][ T5815] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1089.628683][ T29] audit: type=1804 audit(1594898836.016:3301): pid=5799 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/845/file0/bus" dev="sda1" ino=16379 res=1 11:27:16 executing program 4: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1089.825528][ T29] audit: type=1804 audit(1594898836.136:3302): pid=5815 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/860/file0/bus" dev="loop2" ino=1055 res=1 [ 1089.858206][ T29] audit: type=1804 audit(1594898836.176:3303): pid=5806 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/906/bus" dev="sda1" ino=15759 res=1 [ 1090.035117][T31745] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:16 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:16 executing program 0: syz_emit_ethernet(0x1b6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x180, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x27, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x54, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:16 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:27:16 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:16 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:16 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x62, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:16 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1090.433653][ T5837] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1090.435516][ T5843] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:16 executing program 4: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1090.600860][ T29] audit: type=1804 audit(1594898837.066:3304): pid=5837 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/861/bus" dev="sda1" ino=15899 res=1 11:27:17 executing program 4 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:17 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x62, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1090.790709][ T29] audit: type=1804 audit(1594898837.116:3305): pid=5850 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/846/file0/bus" dev="loop5" ino=1057 res=1 [ 1090.824785][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1090.948980][ T29] audit: type=1804 audit(1594898837.246:3306): pid=5856 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir198857651/syzkaller.4zYRmb/907/bus" dev="sda1" ino=16370 res=1 [ 1090.985247][ T5864] FAULT_INJECTION: forcing a failure. [ 1090.985247][ T5864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.059401][ T5864] CPU: 1 PID: 5864 Comm: syz-executor.4 Not tainted 5.8.0-rc5-next-20200715-syzkaller #0 [ 1091.069264][ T5864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.079341][ T5864] Call Trace: [ 1091.082663][ T5864] dump_stack+0x18f/0x20d [ 1091.087025][ T5864] should_fail.cold+0x5/0x14 [ 1091.091644][ T5864] __alloc_pages_nodemask+0x177/0x720 [ 1091.097143][ T5864] ? __bpf_address_lookup+0x290/0x290 [ 1091.102804][ T5864] ? __alloc_pages_slowpath.constprop.0+0x2780/0x2780 [ 1091.109595][ T5864] ? lock_acquire+0x1f1/0xad0 [ 1091.114409][ T5864] ? tun_build_skb+0x1d2/0xf30 [ 1091.119206][ T5864] alloc_pages_current+0x187/0x280 [ 1091.124366][ T5864] skb_page_frag_refill+0x281/0x590 [ 1091.129588][ T5864] tun_build_skb+0x24b/0xf30 [ 1091.134232][ T5864] ? tun_net_xmit+0x16b0/0x16b0 [ 1091.139108][ T5864] ? __lock_acquire+0xc1e/0x56e0 [ 1091.144076][ T5864] tun_get_user+0x7fa/0x35b0 [ 1091.148696][ T5864] ? lock_acquire+0x1f1/0xad0 [ 1091.153399][ T5864] ? tun_build_skb+0xf30/0xf30 [ 1091.158188][ T5864] ? tun_get+0x160/0x280 [ 1091.162465][ T5864] ? lock_downgrade+0x820/0x820 [ 1091.167331][ T5864] ? aa_file_perm+0x5e2/0x1100 [ 1091.172122][ T5864] tun_chr_write_iter+0xba/0x151 [ 1091.177076][ T5864] new_sync_write+0x422/0x650 [ 1091.181775][ T5864] ? new_sync_read+0x6e0/0x6e0 [ 1091.186555][ T5864] ? lock_downgrade+0x820/0x820 [ 1091.191421][ T5864] ? vfs_write+0x397/0x6b0 [ 1091.195859][ T5864] ? apparmor_file_permission+0x26e/0x4e0 [ 1091.201604][ T5864] vfs_write+0x59d/0x6b0 [ 1091.205867][ T5864] ksys_write+0x12d/0x250 [ 1091.210210][ T5864] ? __ia32_sys_read+0xb0/0xb0 [ 1091.215010][ T5864] ? lock_is_held_type+0xb0/0xe0 [ 1091.219963][ T5864] ? do_syscall_64+0x1c/0xe0 [ 1091.224574][ T5864] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1091.230573][ T5864] do_syscall_64+0x60/0xe0 [ 1091.235005][ T5864] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1091.240916][ T5864] RIP: 0033:0x416661 [ 1091.244806][ T5864] Code: Bad RIP value. [ 1091.248873][ T5864] RSP: 002b:00007f9304e83c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1091.257314][ T5864] RAX: ffffffffffffffda RBX: 000000000050b3c0 RCX: 0000000000416661 [ 1091.265310][ T5864] RDX: 00000000000001ce RSI: 0000000020000240 RDI: 00000000000000f0 [ 1091.273305][ T5864] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1091.281297][ T5864] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1091.289286][ T5864] R13: 0000000000000c4a R14: 00000000004ce8f4 R15: 00007f9304e846d4 11:27:17 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:17 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:17 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x62, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:17 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(0x0, 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000100)=0xfc) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1091.564072][ T5872] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:18 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x69, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523de"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1091.607739][ T5877] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1091.732355][ T29] audit: type=1804 audit(1594898838.206:3307): pid=5877 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/847/file0/bus" dev="loop5" ino=1061 res=1 [ 1091.808693][ T29] audit: type=1804 audit(1594898838.236:3308): pid=5872 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir887629090/syzkaller.w7SGPI/862/file0/bus" dev="loop2" ino=1059 res=1 11:27:18 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x69, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523de"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1091.878913][ T5885] FAULT_INJECTION: forcing a failure. [ 1091.878913][ T5885] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.008098][ T5885] CPU: 0 PID: 5885 Comm: syz-executor.3 Not tainted 5.8.0-rc5-next-20200715-syzkaller #0 [ 1092.017946][ T5885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.028042][ T5885] Call Trace: [ 1092.031354][ T5885] dump_stack+0x18f/0x20d [ 1092.035710][ T5885] should_fail.cold+0x5/0x14 [ 1092.040418][ T5885] should_failslab+0x5/0xf [ 1092.044864][ T5885] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 1092.050982][ T5885] kmem_cache_alloc_trace+0x49/0x2c0 11:27:18 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1092.056610][ T5885] cma_alloc_port+0x9a/0x530 [ 1092.061228][ T5885] rdma_bind_addr+0x10fa/0x2fa0 [ 1092.066115][ T5885] ? cma_acquire_dev_by_src_ip+0x960/0x960 [ 1092.072004][ T5885] ? __xa_clear_mark+0x110/0x110 [ 1092.076996][ T5885] ? do_raw_spin_lock+0x120/0x2b0 [ 1092.082049][ T5885] rdma_listen+0x9b/0x980 [ 1092.086525][ T5885] ucma_listen+0x18c/0x220 [ 1092.090970][ T5885] ? ucma_notify+0x1b0/0x1b0 [ 1092.095994][ T5885] ? __might_fault+0x190/0x1d0 [ 1092.100987][ T5885] ? _copy_from_user+0x138/0x190 11:27:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1092.105947][ T5885] ? ucma_notify+0x1b0/0x1b0 [ 1092.110552][ T5885] ucma_write+0x288/0x350 [ 1092.116144][ T5885] ? ucma_close_id+0x60/0x60 [ 1092.120766][ T5885] ? ucma_close_id+0x60/0x60 [ 1092.126669][ T5885] vfs_write+0x2b0/0x6b0 [ 1092.131225][ T5885] ksys_write+0x1ee/0x250 [ 1092.136242][ T5885] ? __ia32_sys_read+0xb0/0xb0 [ 1092.141765][ T5885] ? lock_is_held_type+0xb0/0xe0 [ 1092.146734][ T5885] ? do_syscall_64+0x1c/0xe0 [ 1092.152185][ T5885] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1092.158198][ T5885] do_syscall_64+0x60/0xe0 [ 1092.162635][ T5885] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1092.169051][ T5885] RIP: 0033:0x45cba9 [ 1092.173614][ T5885] Code: Bad RIP value. [ 1092.177704][ T5885] RSP: 002b:00007f7381c54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1092.186158][ T5885] RAX: ffffffffffffffda RBX: 000000000050f840 RCX: 000000000045cba9 [ 1092.194140][ T5885] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 11:27:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:18 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x69, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523de"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1092.202127][ T5885] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1092.210122][ T5885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1092.218105][ T5885] R13: 0000000000000d5c R14: 00000000004cfa57 R15: 00007f7381c556d4 [ 1092.318744][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 1092.380594][T31745] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:19 executing program 3 (fault-call:2 fault-nth:1): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:19 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:19 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:19 executing program 4: syz_emit_ethernet(0xd, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:19 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:19 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1092.642852][ T5914] FAULT_INJECTION: forcing a failure. [ 1092.642852][ T5914] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.657979][ T5917] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:19 executing program 4: syz_emit_ethernet(0x20e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1092.758753][ T5914] CPU: 1 PID: 5914 Comm: syz-executor.2 Not tainted 5.8.0-rc5-next-20200715-syzkaller #0 [ 1092.768610][ T5914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.771573][ T29] audit: type=1804 audit(1594898839.226:3309): pid=5917 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/848/file0/bus" dev="loop5" ino=1063 res=1 [ 1092.778688][ T5914] Call Trace: [ 1092.805429][ T5914] dump_stack+0x18f/0x20d [ 1092.809771][ T5914] should_fail.cold+0x5/0x14 [ 1092.814378][ T5914] should_failslab+0x5/0xf [ 1092.818808][ T5914] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 1092.824892][ T5914] kmem_cache_alloc_trace+0x49/0x2c0 [ 1092.830386][ T5914] cma_alloc_port+0x9a/0x530 [ 1092.834990][ T5914] rdma_bind_addr+0x10fa/0x2fa0 [ 1092.839869][ T5914] ? cma_acquire_dev_by_src_ip+0x960/0x960 [ 1092.845686][ T5914] ? __xa_clear_mark+0x110/0x110 [ 1092.850638][ T5914] ? do_raw_spin_lock+0x120/0x2b0 [ 1092.855687][ T5914] rdma_listen+0x9b/0x980 [ 1092.860034][ T5914] ucma_listen+0x18c/0x220 [ 1092.864463][ T5914] ? ucma_notify+0x1b0/0x1b0 [ 1092.869071][ T5914] ? __might_fault+0x190/0x1d0 [ 1092.873848][ T5914] ? _copy_from_user+0x138/0x190 [ 1092.878800][ T5914] ? ucma_notify+0x1b0/0x1b0 [ 1092.883401][ T5914] ucma_write+0x288/0x350 [ 1092.887802][ T5914] ? ucma_close_id+0x60/0x60 [ 1092.892412][ T5914] ? ucma_close_id+0x60/0x60 [ 1092.897267][ T5914] vfs_write+0x2b0/0x6b0 [ 1092.903502][ T5914] ksys_write+0x1ee/0x250 [ 1092.908055][ T5914] ? __ia32_sys_read+0xb0/0xb0 [ 1092.912830][ T5914] ? lock_is_held_type+0xb0/0xe0 [ 1092.917771][ T5914] ? do_syscall_64+0x1c/0xe0 [ 1092.922368][ T5914] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1092.930376][ T5914] do_syscall_64+0x60/0xe0 [ 1092.935262][ T5914] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1092.942992][ T5914] RIP: 0033:0x45cba9 [ 1092.947347][ T5914] Code: Bad RIP value. 11:27:19 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) [ 1092.951764][ T5914] RSP: 002b:00007f56d05c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1092.960647][ T5914] RAX: ffffffffffffffda RBX: 000000000050f840 RCX: 000000000045cba9 [ 1092.969391][ T5914] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1092.978106][ T5914] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1092.986847][ T5914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1092.995541][ T5914] R13: 0000000000000d5c R14: 00000000004cfa57 R15: 00007f56d05c46d4 11:27:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:19 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1093.040481][ T123] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:19 executing program 4: syz_emit_ethernet(0xfdef, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:19 executing program 2 (fault-call:2 fault-nth:1): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x8, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:19 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6a, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1093.281618][ T5940] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:19 executing program 4: syz_emit_ethernet(0x2000040e, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:20 executing program 4: syz_emit_ethernet(0xfffffdef, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1093.536112][ T5955] FAULT_INJECTION: forcing a failure. [ 1093.536112][ T5955] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.549364][ T5955] CPU: 0 PID: 5955 Comm: syz-executor.2 Not tainted 5.8.0-rc5-next-20200715-syzkaller #0 [ 1093.559181][ T5955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.569249][ T5955] Call Trace: [ 1093.572576][ T5955] dump_stack+0x18f/0x20d [ 1093.576930][ T5955] should_fail.cold+0x5/0x14 [ 1093.581551][ T5955] should_failslab+0x5/0xf 11:27:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1093.585992][ T5955] slab_pre_alloc_hook.constprop.0+0x3d/0x1f0 [ 1093.592085][ T5955] kmem_cache_alloc+0x46/0x3a0 [ 1093.596866][ T5955] ? mark_lock+0xbc/0x1710 [ 1093.601311][ T5955] xas_alloc+0x330/0x440 [ 1093.605577][ T5955] xas_create+0x2b5/0xfb0 [ 1093.609939][ T5955] __xas_store+0x88/0x19c0 [ 1093.614376][ T5955] ? xas_start+0x151/0x530 [ 1093.618807][ T5955] ? xas_load+0x66/0x140 [ 1093.623069][ T5955] __xa_insert+0x14c/0x250 [ 1093.627523][ T5955] ? __xa_cmpxchg+0x370/0x370 [ 1093.632918][ T5955] ? kmem_cache_alloc_trace+0x188/0x2c0 [ 1093.638507][ T5955] cma_alloc_port+0x232/0x530 [ 1093.643206][ T5955] rdma_bind_addr+0x10fa/0x2fa0 [ 1093.648119][ T5955] ? cma_acquire_dev_by_src_ip+0x960/0x960 [ 1093.653949][ T5955] ? __xa_clear_mark+0x110/0x110 [ 1093.658907][ T5955] ? do_raw_spin_lock+0x120/0x2b0 [ 1093.663949][ T5955] rdma_listen+0x9b/0x980 [ 1093.668306][ T5955] ucma_listen+0x18c/0x220 [ 1093.672756][ T5955] ? ucma_notify+0x1b0/0x1b0 [ 1093.677359][ T5955] ? __might_fault+0x190/0x1d0 [ 1093.682147][ T5955] ? _copy_from_user+0x138/0x190 [ 1093.687099][ T5955] ? ucma_notify+0x1b0/0x1b0 [ 1093.691706][ T5955] ucma_write+0x288/0x350 [ 1093.696050][ T5955] ? ucma_close_id+0x60/0x60 [ 1093.700659][ T5955] ? ucma_close_id+0x60/0x60 [ 1093.705263][ T5955] vfs_write+0x2b0/0x6b0 [ 1093.709534][ T5955] ksys_write+0x1ee/0x250 [ 1093.713879][ T5955] ? __ia32_sys_read+0xb0/0xb0 [ 1093.718647][ T5955] ? lock_is_held_type+0xb0/0xe0 [ 1093.723591][ T5955] ? do_syscall_64+0x1c/0xe0 [ 1093.728366][ T5955] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1093.734363][ T5955] do_syscall_64+0x60/0xe0 [ 1093.738794][ T5955] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1093.744694][ T5955] RIP: 0033:0x45cba9 [ 1093.748597][ T5955] Code: Bad RIP value. [ 1093.752667][ T5955] RSP: 002b:00007f56d05c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1093.761114][ T5955] RAX: ffffffffffffffda RBX: 000000000050f840 RCX: 000000000045cba9 [ 1093.769099][ T5955] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1093.777082][ T5955] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 11:27:20 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x10, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:20 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1093.785061][ T5955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1093.793049][ T5955] R13: 0000000000000d5c R14: 00000000004cfa57 R15: 00007f56d05c46d4 [ 1093.880508][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:20 executing program 4: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:20 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1094.146278][ T5980] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x16, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:20 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:20 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6c, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad58"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:21 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x2, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:21 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:21 executing program 0: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x16, 0x8, 0xfa00, {r1}}, 0x10) 11:27:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x10, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:21 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x3, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:21 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x6, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:21 executing program 0: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x14, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa02, {r1}}, 0x10) 11:27:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) [ 1095.250050][ T6032] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1095.402307][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1095.402325][ T29] audit: type=1804 audit(1594898841.876:3312): pid=6043 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/851/file0/bus" dev="loop5" ino=1067 res=1 11:27:22 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:22 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x7, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa02, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:22 executing program 0: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:22 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0xf, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1095.570558][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:22 executing program 0: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa06, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 11:27:22 executing program 0: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1095.826117][ T6075] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1096.019006][ T29] audit: type=1804 audit(1594898842.486:3313): pid=6075 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/852/bus" dev="sda1" ino=16268 res=1 11:27:22 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:22 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x2, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 0: syz_emit_ethernet(0x116, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0xe0, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x13, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa0c, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2000000}}, 0x10) [ 1096.076508][ T29] audit: type=1804 audit(1594898842.526:3314): pid=6083 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/852/bus" dev="sda1" ino=16268 res=1 11:27:22 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x3, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 0: syz_emit_ethernet(0x176, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x140, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1f, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x5e, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3f"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1096.242328][ T6116] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa12, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x7) [ 1096.366284][ T29] audit: type=1804 audit(1594898842.836:3315): pid=6116 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/853/bus" dev="sda1" ino=16265 res=1 11:27:22 executing program 0: syz_emit_ethernet(0x176, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x140, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1f, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x5e, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3f"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:22 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:23 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x4, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:23 executing program 0: syz_emit_ethernet(0x176, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x140, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x1f, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x5e, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3f"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x200001d0) 11:27:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:23 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x5, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:23 executing program 0: syz_emit_ethernet(0x1a6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x170, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x25, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x8d, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1096.797120][ T6153] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:23 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1097.008153][ T29] audit: type=1804 audit(1594898843.486:3316): pid=6176 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/854/bus" dev="sda1" ino=16034 res=1 11:27:24 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0xc}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0xfffa, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="020002f92a6c31d1262151cada8085288436", @ANYRES32=0x0, @ANYRES32=<r8=>0x0], &(0x7f0000000000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x7a, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b005) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000040)={r8}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$snddsp(r4, &(0x7f0000000200)=""/211, 0xd3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={<r9=>0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) setxattr$trusted_overlay_redirect(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r9, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x1d, @dev={0xfe, 0x80, [], 0x24}, 0x3}, {0xa, 0x4e22, 0x800, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, r9, 0x4c1}}, 0x48) 11:27:24 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x8, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:24 executing program 0: syz_emit_ethernet(0x1a6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x170, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x25, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x8d, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:24 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc402", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:24 executing program 0: syz_emit_ethernet(0x1a6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x170, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x25, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0x8d, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x12}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:24 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xa4, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4d"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) [ 1098.154220][ T6225] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:24 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x600}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1098.285325][ T29] audit: type=1804 audit(1594898844.756:3317): pid=6225 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/855/bus" dev="sda1" ino=16271 res=1 [ 1098.429693][ T6237] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100), 0x8) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1098.527166][ T29] audit: type=1804 audit(1594898844.996:3318): pid=6237 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/856/bus" dev="sda1" ino=16271 res=1 11:27:25 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc403", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xa4, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4d"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0xc00}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x1200}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:25 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xa4, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4d"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc406", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000380)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250f000000640001800800030000000000080003000300000008000300010000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000080003000000000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x16c, r1, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x55}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xc39d}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xd, 0x3, "c46c2b33ca5111cb5b"}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r3=>0xffffffffffffffff}, 0x106}}, 0x20) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20100, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 11:27:25 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r1, r0, 0x0, 0xa198) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:25 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb0, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x4000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:25 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc407", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x2}}, 0x18) 11:27:25 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb0, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:25 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4f0", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x2000000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1099.577448][ T6307] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000040)=0x4) 11:27:26 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x29, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb0, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1099.767876][ T29] audit: type=1804 audit(1594898846.236:3319): pid=6315 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/857/bus" dev="sda1" ino=16371 res=1 11:27:26 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:26 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4c0", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x6000000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$SO_J1939_SEND_PRIO(r2, 0x6b, 0x3, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:26 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb6, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1099.963001][ T29] audit: type=1804 audit(1594898846.286:3320): pid=6307 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/857/bus" dev="sda1" ino=16371 res=1 11:27:26 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0xc000000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:26 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb6, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:26 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x111}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10000, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x4c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r5, 0x89f9, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000200)={'syztnl0\x00', r9, 0x2f, 0x2, 0x24, 0x1000, 0x1, @remote, @remote, 0x8000, 0x8, 0x401, 0x8001}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000040)={0x3, 0x5, 0x101, 0x9, 0x13, "6503826577194d95"}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1100.244224][ T29] audit: type=1804 audit(1594898846.716:3321): pid=6354 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/858/bus" dev="sda1" ino=15759 res=1 [ 1100.377473][ T6363] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1100.579070][ T6369] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:27 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:27 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb6, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x12000000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:27 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:27 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff}, 0x106}}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000380)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250f000000640001800800030000000000080003000300000008000300010000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000080003000000000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x18, r3, 0x12fc8ad0283830c7, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x4}]}, 0x18}, 0x1, 0xf618000000000000}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x31c, r3, 0x304, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb0a}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}]}, @TIPC_NLA_NODE={0xd0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "43c86d4bc34e6ab2da5ef12fe6bbc0ed6e71acd93da883c658480ecee4df6f44d38551e4"}}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "cf93659ff6ccd25c1f48ac16d88fecf9f14ad915"}}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "1e1eb88fa8c61e6485c3bc8c26a83277a20079ff"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x34, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdcd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xce25}]}, @TIPC_NLA_NODE={0x180, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "1ed4aaedc6385084e0855a96b0c38e9b523061c6f21b7a9bcbc0bdc01043a150c8ca"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ID={0x82, 0x3, "c1fc59ca04e2028795078fe945cb67a552573293ecdfaddf601d85d3710a4713186296cd4f34eb30951c0ffedc872951f095851d054257fba856625230aa0a0b2ca5571c73bc6c0f4c11a14eee9b7d957007e0c711c74cdb92778c6b30cb6b60fcc9fd65cd0a92d9141e8ce35b49ee11b7a840e588332912d7f7051778a6"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ID={0x9a, 0x3, "d6ebe85e07ab79fb04a51b7950f703aa7babf7384971fde012940eadb29ded06bd6a7bebdcab4c5ff64d4eaab64697cf08c88ce3bc9eea15f7732b849739cc189fbf61aedd5450f370cd2fc70b94c068f49f46584455fc57632728e87c0653f79b80a0df48e25a7d77c2756272c33b1196b0dff85adccaa92828f986fcc2eb12d129023d1fa9ec890042651744040d3a0becb271f4e8"}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x40000d6}, 0x4) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 11:27:27 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb9, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:27 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x40000000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = getpid() r3 = socket$inet(0x2, 0x3, 0x3ff) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x4c}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r9, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000380)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250f000000640001800800030000000000080003000300000008000300010000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000080003000000000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) sendmmsg$sock(r3, &(0x7f0000008740)=[{{&(0x7f0000000140)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)="fec9c2a907e4e0161c4fc286945709c3483a0bf318bfec5d8cdf44864e0f0d4af3e640c78b4c3f91d91f4db52bb68db3ac48cc81605d5db0aec4f9fa6d32ce9c90fcea78ad5408736ca285405289fe4d2d82f9b581da07610c58872c225e537e72ea9912cb23e5448198cd245530", 0x6e}, {&(0x7f0000000280)="136b3bee3d864b22252aba69433f9a5c57d1182684c1e8e7a2d3974490f9dd3d508c795d2f6f9511e499025a78f243f51be52841492b939452e80af7b4770ea2dc4c907b03e24c407adfd0244f9e6ed0a6402be0965dda5c18f1f403a131d195e2c3ebc5459bd978a8afdf35a9fcba2899ea8f2147271256e66510cd1ff2acc07355b7ba6398858733a08b0f98e249e1c700223aa4f7980c1d8e21ddc5307b2d7b4c191f3c3a162353d46469eca398c4bb553d9f93f86869d5957a778752a104e6930556d10cc272fe01aeb2422f8802878f8d450e77887dd0a47b8a337d9fd42b1e9709945490fb1b900aa29750a7096452", 0xf2}, {&(0x7f00000003c0)="f6ca0aa49878960bdc534523d6b5961aa62290e0d91ad9b7ea2519112a0f1b186dbb56ce8d6119edf6fc636601a46a25bb4bc520efdacf682bce19f2305199a93c9f7f5b7f0bf1c4944ca7c7075cef92df1744882a3155e06a8a5d244be9ddb31de5f1c9c5c763c6d9b6e871c18a566a36303a9fab5bb91e9ef59331df6a3cec2eb0c335b9de9d7dd5b97f82819256b78e10280e86e0d7f52484f074817767d34d9f25ddc596283f1e2c818e88040a0f44", 0xb1}, {&(0x7f0000000040)="584322cc242195c8ed867a32f232eac5b2cdecc0fd90edca5cef9558882d3a9a9923dccb440a3508f3d3862c70fcb488262ce6", 0x33}, {&(0x7f00000000c0)="14c1b1ec63e769a37ebf1ecf0fbca27b6997d4267ceaab70e0be", 0x1a}, {&(0x7f0000000480)="ac5a98e214586bc5740f83a94e2ae687a355cf3a86eb6102d6ac8042dd9505d1676b966de6938a6c79c91c7f50c9fb94e88a86f84ddeaff9739928ed4b614264ceb6585112a8b22ca00b48f70788a2694443063741d9d27fd5d661af11ac7f6221", 0x61}, {&(0x7f0000000500)="c95f3a2664ff400a1b842e0aa361350eba8ae70e17521dd20d37f0ebb2fbdb461faa3d9aac813f945c38135690c1cad465abc2dc824b226210197e944e03c6613c05fc7b4a1f8d1a04ade9e5c6adeed2c2ba689a68eaa0143d275be4549eba0458b4b2cb150b6adb9aa4e876e97a2629d8597d37bd6bdf13a0ab6743cf78057d8bc0ad361fb2f730551435c5c82e19e214e4ec905b7f75c10ce1fb953f38", 0x9e}], 0x7, &(0x7f0000000640)=[@txtime={{0x18}}], 0x18}}, {{&(0x7f0000000680)=@can={0x1d, r8}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000000700)="ea4cf8d8cbafc850f81e63267e30b4a17c82951fd302bac720ebc87f3ab641e094b2dcd1db5f8c09d7c71f18aac8fe9b6d00333a85b05fd9cf836794cb71d1825eaa97d758e2101a7c5d5f73db36658e8c21623f0445643ecfaf608aa701f78b884ca1ad5595ac9a1a3fc527aded549fc054c3f35c70716b24a606c44131daf0055a7675e1e7617635bd9c7c5e5749", 0x8f}, {&(0x7f00000007c0)="c758d52eb8bbc9f63e419020bf5f71e3a5fa90f20c078039d4e873e91596f32cd2d0531ddeab2354864c88c95130cf365ea661bd604d4f4d1b1112cb6c9304e56c24be242cfdfa3d29bbd30da7b6f95fdbec10a9438b5d8a8880a0f2db055754348f98cd0270708a16d8531202f62ee0ff597e72f3521c3ae9739f1bc740a685ee912d16d290320509b866fa2c778fc6e81a5c2b9e46625288faad47c4dce394e96b083432cf3ec98123c57470c0be9c83a8495078cc6d57c552fb7782c71ada622283ed4ce7efb510e4438bee6bf9433694012088faa1aa4784fcb27fd9a44b83dea53a0d9fb286c248db063afd0a3af2b001baa6cd7f66", 0xf8}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="ca7819636bb45c700a4770bc7f9b79d604dd7c1c0e8a082ca993a9d6c0b0343244638f912d082748cb5f3648611b466535f917d60ff35e441830f30bab69015b558a97404dbf72c24b19de061bec82be242074e5aaecfa174946ed2d5cfc4ddd4c8d8469a2f2a8355dc71202b02e396a0e796227fffdbb8b64c7ad839ca0be35072f718d7a52b311b17eb9d9495cb41b22d4b3f6", 0x94}, {&(0x7f0000001980)="f79c44d63f5058a017f6fedaa5cbbcbb3162c6bc6567af1712ba4abdbd4033", 0x1f}, {&(0x7f00000019c0)="44ad83faac86a3f2ba063a1369f8205adc90c110d3f6a6b5e8cd23f08dfa44697af4d294ddcfa79a50c4fcd2b3984fc8f9a7a50be8e9f30d0d8b", 0x3a}, {&(0x7f0000001a00)="9d528b4a2d9f2d5f3e802b60cca1d89000654b53647ea99f9db724e485db3439f19eb39fddf335f37632457bdb4c652636cca207f70191d2305a301c21a6cc9df7c3e34851b263993f8c2b90c2b20380e05e3575d347a05c9789a7af07b853fb88d233ecf08bd3651c3f35f41da888629f32724aa22de6ef103a89e23f5f6d189d3d928330999fab74b908848cda21874661ea065ba83ea23334729b64c49db3b3f68717f0805e103908f6ee2f902cd334d15dacf02518888e7941f3c4617dbdc9190938a432eaee3a39b1de01bdde6408fbe0b15bced5531ebcff7476c7140b0a2f2115c05e235b909f9aa132b9364d6050b473fcf61d62c656f3c62a03153b2e69b6fe1b6cea294b4466ca0d91b6be95853a7a1962af01fff1607c1322af7370ddd71c200c14d0f94ceaecca7fc6469224dc53a4eebcae1d9dd2b1d1955fe97206e42ea27af8f6c2bacf77c326b168056f03564c8cfa6ff5fd32986231bbc5985b800c77d63869f06202c112736daf6c9219a4a86f264d3b211cb1112b32908e48c51b2063de1a22549e18746d689461689dc8cc92b4e611aab3205a9ccd80cc5f91de1106123ffe89bf09dcb1840f75ff0f661d0c6ce1ce5d286ad4da7d27eb7d174ad94c216566da07c65c675325f327e11c3a5561245849b3130601ba99f06dc28d34f76f938925ec7001f019c81dbcaddbef0abad876b3734e9832e25644fd948ab34c4ebd79bc55cd6cf5bfd06d91307263831c023c068e24874dc42851d0c9e8fd140e36a4f2ac66b6278ca794cab967de31e00b76ae34b810ba0dc18bfb9fd02538cb8b56b8ee96ada348f8393b008bd3ad62e1eacfc85aab07864fba91b930f67aec39ef215eff393ac2bb2be4aee48b2076d5211546879c46ad5f4d2032f698de629c7f819cf8fd7652695c304fbc1db2360e745271c0bf400a605844b0ef7b302bf4723d3a76d25e1caede01d46525b263aac9a638c7c22fad0ce1a9eb00f1f1728920045146135d3c1c595dc7ba78c03b32a0efbd4725c97ff16386ab12b6da00d5de61cd40ee278801fada731e36739aa3c8fcc151359fa4cdbfa4d39e5b4e1bf4e16da1a2dec4051727a2a984b0cbd5dc37bbaf192ee9b389ea76c9d5a54e71563beee590e166b2cc24318125b7d2672df2a466232dcb3297d7b6e07ac5028d71aa1150677246076e123f6f9bc6429b91e2497e1899c3df7762ef391bf8bed7ae265199d5eb61c51cd5f50cd393a57bec2a4f9d7122e9ae32990201cff1a0f070210b021107638d40832973d6e4548d7f3951326e8d5d60c46f415ff23715a9f8c943c934e671a910cf5b9afd7c759f21f1a5d59ca78e24b50a5f0e4c3c5d1b540dcb674b3b30de1a9ffb4d946f173eadaa3db5637145edca641e79e81d56da5e873f0831b48e5ee059004f77a46ac0127f918228dcbca755608cb9852549b3982c88059d03baaf1acccf0af0aac82fea5109d8767d5bebf0943fec83d1d2313bb63e810c81820ea7b0cc93032a0672ca9fee02eb929cffa239e6bfb61d2666f152df156813469450538491d08480db04241d5fe899559c4c6ba6ca22e81500154e3717eb0d59944c0893629c9e14c113b4b5752123af8917ec9fde0ae7a2db20ded7b55499ae9143fd526adf01d1ac671e56c412cb1425183c22fa980fafdfe33728e7e012d65599ff70cc32a099f694c7919d743b6dc064a2888c907768ae8e4250a50fd76a4a509ab9439a6cb2333c6954520491e98f2c3ad1f1e573d2b4bd2f4735b3dac4af4afbb4da969b53654eb0f8ffc772beeeb62409f0caa8d05e334fba075486f96a865635f1de3788f47c3f6450c8cdb0c691c3b8cffce11c5150eea34febd3b977444e5cf965430d04d12b7385a7d60073712d5bde49dd2bdb502c6d2ff0131b9dfa7dac05f529b8c92eed14314a07b81453f42623ed1e9f74bc71c6c03dad9f6cc4ee142b7aeebdf137d0fd5145d4c0e27ec3d16807ea106bfc019a455687d57cae496ec495dd4fcfcec444fae21fcc4568f9decc30e18f4356786fbd3659d3833758abbdc1dbaa41c22db64081a3f14eb888388bc4f177481de6616789d6018a9659ae5b1f36f254d9dee0c1c7f9869de3529b89353a5d2354486b6559671f291356ada8d5390052ee0e61b5c3103a881e8b5aa611ab454b2f927a2ce5381bcfbd12bf076c4047f150d82556afe3abae75e565812d3c53dd0147a6af8bf8abcb668c104d3f1420cafc8ea306c131c184dc62c84516bb1d6b8b1033a5393634e1cd727cd383b49e3e5be2ae950bacba70fe8636312a3fdd51f6b7f3b23404b7d2e122ff17ceb54e89c6c5493c3e9998900003da97fc4c1ff9a876520ad2c8e367934b57d5930d5ddb0beb0385d8f28778b5950825e2bc434021aedaac0e29b41c99ed8bae51b0bc936774d758578bf61feede22cea6d6dcbf8ff944a24eda383e564bebd52ad9b28bfdd25b838b396019763537b942c1121333b093345b758ac99a35bd7a8a07e6c441ab0c7e316e8d3765355146b78519e48a16f641c89966d3888f578d47aba2d913c030ef6852f97f71469e507ed5eed634a07d352e192dfb482e29ffede06f9046569aaa417488d705387df6c011c8ddf943c356e085e00b80913d5ee069216b1b8310fa17f824eb06d763477c5313d18d15ea031c041741c633771569b33359905b07bb7fe5cb489599f2fcf8ea079f776a153410f811ddde5dfc40da0951f0241cfbfae0d33c5595ef29a0b3bfe8ad07781af398f39081f5629afe4e9a86722d36df24b4c63d0711bf1178cdf12578052d351505f6f7ba0e020a9dbc64c814908d4b8a760ebdb70228b4f2bf3a45af8c9717b20a60b50e62e5facd969290e1d877ab765427bbf3c37902ed5c1a4a3d3db16943d804f1c59011f3122262c6db11415678e5bae81e5cc01a1c7fbef4bfbf7528b9c66add8fd820a1be87712ac8b41462442fb4b7104ee3b75e3a4b03c4d8b2bbf412609e9b2eb3e0532fc163b6ec5bf986671b0eff96db384f0a26b550fe96b0f53232c7e1fdc6ded087c34563a9b36c9ae6c7b38c272cb5a551bc9034a1360a92b42bb032d4a6e7311019b5042d1b70d666d17ded40a6a213fbf875dc0157c1353014b509c812c3ad5551fd4490b60d26a053638f072b94c53d2ceb7c2921e914296b991f2a10d6df2e1b7aec3e4e6a73ae9d86f8bee99a07eadb5d718ae2971d535a76500259fe48ff1c15509b901cefa591d86ba36b0adc89dad2b290b224b9a0084354e14e27539e18adb1b21509c0cece24e0a3b3df99e9ff2156d556e3a4531df83e6a479544f63249f1911bf8b3f2268353c410d9e47f99845e794848bdbab97e51460b5d4265210f456fe531ec639f9803d07ff998d848a5edcce39dc120cdee968eee697ffbad00c9112e8619482bb138289c165ca6769a7a0427e99ab414c2fbba502ba385c04cd78a3ce14c073c03b56a529ca743d8f6af47f072515c46ddfd7e7d05837c1d6391601152d82d5400bce02b593f0068228b5a7ab92a2bb7952ac37f40fd7871867bd731dc68faf5b32fb81d0dcfca36baf25653837b6bc07b6556ba2975103bcc828d86dd77f18fb00c402bfab107e8ca1dc8b584b5e33613cecd3e6a5976104d00e96fd7d880de0f5414f2c7f444c491b3dfe72a0eb6c68832e2ad509cfdb213b1e320e05ab310d4fb671f3a557f3be1d688a9ce0314a735e539bede6f76107b5cd524be9ce476ad41cb48f9b95caf5f4df6d92809f155642815c4921cfa9f24b72e225b827b08ec4b57a80be93def6dc03e39e74c8325ba8a59ca5a9dcdd13e4e8e676c184f6b2411df72af66ee8885248a4631f3ada5d831684ba6cc69a68ee30a4177d96c6a4574d9b6cd10a9326d62271107840bf536fe82befce10346cccc3fc615a0f1de43bc56782492ba09a628b2e2c39193aa2788d5a04e1de8803ae80dc72aea4de8aebb0cf9cd246d8518ceda4fbb0d8ca699781e03d84f02052c5ad3d6dc240946c51bfa6203a785618c7721d284004319fd3a65ebd1f510bfb0d002495ad9ac3dbf461b7db43a775b239e947a3e34b42a61d75466673972958b7c67a5997395ed13d851439a684a49c30b0ff9de5ea427cb8e8ff29c97d20a6111620099f7d7153508dbf55e7b1b1cf6f90e12c7aea074475793eded021b86e0ffdb37edda7207797f9b32afda37512fb896d72527d2cdbd6b1c3db41587fecef50abb33949346a9a9b062e47f150e945ac6a80398a75b01d4634336c8bda9fc7f90ad2a50b0bc2e5e9b991aa2579dc0d0f32861c9b4b4dafe0d821ca95306e13064932fcbce966092db724791f5df2f82d97f1886302ae62c39127c4a42d11778df2c28e9618c6279a37842d9b8259186d58d0007db9e70889a3b607b190cdd64a8fe3b7ef6f648b65772bb9c2ccbb2072386c5c69927a2160144f2c57644deb12471f22fc36436a1024f176e223cb35332eb5a7caaa8bbe016bb9d11789749ac7be6d15e3db47cdf8157e7e15c64bd40f98c0f50be604818b62c915c2e2fced91aef6c7bbe756faf76cd436d3dfd5d69a9a93a0182a8edb33d79a226ebb2ae04dc5574099d7f0f88b315f711c5e74bc4ce32c525e9f86ebe6d427edf1f39c6c37d212a7ea194a6587d6e2c73b82a693ab978faae756b478729f637e87396eb4f386041b134d8c5b970bce80a32d82b6b779686dc70a6c8c9de813eb13884c23ac3515985f0769fc0e30622267daf333e89e7b133de988be538a059461f84f2d04dea2df2e61f5ac701becd1a85bf348f466c8fce291e7f1e56a68fa31c66b3bfce4d7012af48e3af0fcf695f4b8f12b901df7f7ed65ddd55a4db9f1a744e97862a0e1063c36fc3b54319632372050e6a7effe715773aefe1ca534cf8a10d34bf8a5466bb8d7ea763956b6709b851cd6354592321a5204cc415dd07b502c979c40e431dcfee95813ef7d8e2ec6faebdbdfebab41931680e9f7b50adc91b26f8adc5672a9c3a1f004ab4ccbe9afb1533d4d545d0cbf3e9eb3a466a7047fa992a4572a6536db5efeae2b9d8d06e39a24e82265d87137ff144e2f725d2700900cd3527ab2a1a221950782bc30054bfccde89e2c6e900e0f24a020319cfdfcf792fc3ecb43762f00cf7267e5342b1e3e055e5f9afb4e2a7c01d68491d68202166f0992275375e658ab05a919e3885834be98c3fe7d4a03d95751cc18b1aab306207f2e629c8e00b39d781cde7b5574005d56d142a16ec0234f85df1a4957c2f4f69b769b97edd0cc0f0465385ef79c3531458454f1a00e33094a9a88831dd4e9603f1d44689e785dcc14f132d4c29f1b51dacb069bfc777aa7697f994e95a84b95a38a3d018f1ceae4890f662320a2ed966f13ad4b8e8fd8337b6774528ecc9caee4dc341c08f406299610889d8ae455702d3efaca8d515a2a2285c5bfebc21e8a72bd79a6724938e79f7f8ee36975754c59c68ecd0141291d8bdbbaaa21f8d868f5cab0d458b94874ac771308d870a39b4e83ce662accd3793201cb63bb548cf2f8d463a60e8bb6c7a8d2532289bf94cd2672fa952a7052d538fdbd04f70094686acde996dc517dc565822e3b1975b64a191da985da779961e0f21272dd5dc32d62358421cfc0b5cfbf91cbebe1b3b63dfb023f888a7fb8bdf46ede3290bdf7713e3a6b561c948c6dfa37811e77d6d615005d153c45f446232652bb248c178883c47bbc1cd83373b60b9b15cb75c5f9323d9388be5902bbd8f13e3435bd4176299f145a1904566a4e6cd22", 0x1000}], 0x7, &(0x7f0000002a80)=[@txtime={{0x18}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x3d0}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x90}}, {{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002b40)="f448a6b852bd50018a0492890b3312dc8c8979459e34c05b65a17bd8387480c29132e2788721357f268f8f5318", 0x2d}, {&(0x7f0000002b80)="4df8ed247558975155eacd4ddfd9ff4f71b2f7a3319cc781fa13", 0x1a}, {&(0x7f0000002bc0)="c055a67f52db240f3de8cf6873c7994eb761df5972f1c381108a278e4611fa4db470bc9d6363d910b53118d0d20c24c3bc28c4451785dfe0822bfd02265b57ed31ace571e52568ad57c80453cb7a569f5fbde2a02f92bd18df7454362e9a34d0991be3ff4ce00a88c74ef65071d1adcfb82f9951", 0x74}], 0x3, &(0x7f0000002c80)=[@txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}], 0x30}}, {{&(0x7f0000002cc0)=@rc={0x1f, @any, 0xd1}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002d40)="8e5553bc9d774288028930cee84270dc3adc8c382f90946bcd7bd6d5f341e12eda2de999cc27c5174976fe7c8247d63223577bb0e62c24423c5ebc7a868e6bc953d2b2660e68230e1fa6610a18", 0x4d}], 0x1, &(0x7f0000002e00)}}, {{0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000002e40)="24086ed2376569ba3edf77a9f7a9465effc229f051f2e06d53f7485fe98efb856263e9e7e36ed6069913612af4fbb195cd447b75b9532ed50229508a0079cebbc4736474a8bec7854891d8549f1921dfe4be5e0a32f4df3037b5ea783f21d82c54932cab78025c1b853cc041349572f4dd75e2ec383f6d7bb5160583e129187c81062ece8c41ae66b82b052779b5e6ba9d714e928ecdb82bb429b50f1d63144b8b796e851b5e647c3062f1c6c3de9c963b106094a22aea3a559ec5a03dd029ffc74759564e8f124b74d507ed254db1b8cddb278e48590c2ea19ae036e545f9", 0xdf}, {&(0x7f0000002f40)="50d55b8fa740d6e91567b250c848c51588ddee01e02b7438eb312292a4a59566b50609c7b9a5c2bd21da59e5087cfc351e7b4ececfff9bd8e0b6f165132504a5a8b4a4ea80829b4740ee173c4c4b87ec677b71eea2e8e2259ddb6f922f72f032e5f64ef2c8ae98935c3202889a033aea02f4c8c15a7f9f958ac5781571b83139a92b5812cede80a868e11b71bd9fae4fa6866fedc3b2c2048e9c6543d25a", 0x9e}, {&(0x7f0000003000)="aa8586f7cf5a0f89f7476339a3a40f4d3fc9d9f51f22568e68008a6b17d36e435ab6528ae1f0f9403beefde540488d9fc9dd09901162a147172f7035659b8edcdbeb4189a71df5cd585d55b09e53fd76f38b1e282d2f7422e7f7ad14ffaf1d4df83c17123cc7f2f8270fccf1c2aad831073d4de1c344b982e823d177f503a456e87e6277db78038d3eedc009e72e97efe5d4f10a2a81fc99ad1289769de8c9b0f5514210b02e7506c94fbd8cd83c4e1ba731273256b5bf9fbb9ffd69718ec44b23f6f77c0db235f84f427efb53810fd84701678ed69062ae67c3c068bf0ba9bd3a59317b995f173e81", 0xe9}, {&(0x7f0000003100)="717b5a2afb1e398021d5c808527016f71f02983789f445f35cc5242e839717d9a09e3fbba3fdb45cf9f9ab998971151efe160984f6fd905e3db0fbaa2d82226a4fd63179764e9683c297db72805dc7293ad3743918cc3a24164d22e37baca16413db7d7a151a58bd3fbe2279af8176d231a581", 0x73}], 0x4, &(0x7f00000031c0)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0xdfa}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}], 0x78}}, {{&(0x7f0000003240)=@nfc_llcp={0x27, 0x1, 0x1, 0x2, 0x2b, 0x6, "4243790f58f94f5d71b14b0eabeb0f491dd7778d237637d9670840ca26510b68462e8616a13a25d723f1459d671ae2e72490b93716e20ebb0c5093b13c074c", 0x3c}, 0x80, &(0x7f00000033c0)=[{&(0x7f00000032c0)="7140cd30e682e47716240fcfe69ebc1b6915b6208fbc62", 0x17}, {&(0x7f0000003300)="13a878962ed68263ff9e16c78acad283360995c663f48c55de9c120c1858e818fd4db75810fed33ac12343f3db9b89805dd1881c74036a00bc8df11b66d7897afba80690ece71adcbf49bf7ffb2958c428009c1128184e471ac012bb197641f2c095dc2a58a737e79c", 0x69}, {&(0x7f0000003380)="f63b20b457672e51", 0x8}], 0x3, &(0x7f0000003400)=[@txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x30}}, {{0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f0000003440)="6d4dafb6fd240341e23e233a9c10bac347970120bfb512cea57b795c9e146bf32270e16c0fc3f160c6089410619939a44436bbb8000bc8afa89461c4189cacc2c2b34a23835d49d2ddfe209d9db29cf5d3dc55daecce5228a91cead319e58e4c2d5f4f90c269252ea520764d18d95f8c77091dee725b20c531cc40f618f471da08d1561df82df042588d0aa0f5a3e10c7ab3421c121a0bdaabcb3770249cf3573abca15c7acb2402a552567f32f2701611bb30e2", 0xb4}, {&(0x7f0000003500)="f5b37b7b0b083e4acb72532ca4e83b6970c004efeef9edb20b4960566198209968146725b4f80b21c3e8d18bd630ba2f80c5e8be263b6808a3e1151fbe9057cc6d992ba6fdb1136d0f322616b83caa37d543f5af757a", 0x56}, {&(0x7f0000003580)="97e9fa501b10ff81bbf7597cf7dbcfdd3df61978f2f15a939ba7b0b2e17f6d9f8fbe0ebfd5c134ee11a2ce895427ffb6a75ac1ded07d48e00df5fa038e2ac2e343087a098b3663ad0bd511893a6a", 0x4e}, {&(0x7f0000003600)="9dec6c99bdfdd916e792d10f98e51836ec5a13d205e234869f6fd3beca256e386319660b4ad2aee8a803195e21343c015addbe6427b406e492b2e1c3e6e97e7394952940a2d342f08dd9f37d742fa59442096d99dec04f27b15b7fb04a63b0e441a2b2c62e7b7b05836119c824a75f8292e2e9066747d384697c861dd06f150be7771eeb62f21d9e1dfdec18ed9776a185e397ee89a3487d12", 0x99}, {&(0x7f00000036c0)="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", 0x1000}], 0x5, &(0x7f0000004740)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}, @txtime={{0x18, 0x1, 0x3d, 0x6b1}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x81}}], 0x90}}, {{&(0x7f0000004800)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000059c0)=[{&(0x7f0000004880)="41c9544b1f9c4a902e070706c2ac0e05fde5e2403016da8db187b108cd9168a5cacd301de87eccf5cb9e3f", 0x2b}, {&(0x7f00000048c0)="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", 0x1000}, {&(0x7f00000058c0)="d66585cfc199947fc650ecbe774abaa830589d3870dbaa78030315dfb2a3c2cc217ec25b699b8c1506c0ae4de3b14a3e", 0x30}, {&(0x7f0000005900)="0188b0fdf99601be3f0de2d0737fff5b5d1e6d748c404275fb55239d6594468b4d35cc940337798eb9e8625915cc6f9d9e9d01829e9b415103deae2df1ca405bd83d7ee2d3ca337b01a18cedc9378e10b20e188b8fd68c4a9120146325c49feb729390cacdd4fa6eaa2838033501349fa6ab449faa17a6eff2051bc35c4f048066e280fba5d75f155560943e34a6e1a7cc2296e0dd34b1f4c7a8f47ac1770e27c3206d6ba7a48ef5dfbd32f84549", 0xae}], 0x4, &(0x7f0000005a00)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}], 0x60}}, {{&(0x7f0000005a80)=@pppol2tp={0x18, 0x1, {0x0, r9, {0x2, 0x4e24, @loopback}, 0x3, 0x3, 0x0, 0x1}}, 0x80, &(0x7f0000006080)=[{&(0x7f0000005b00)="b49b20a050d3595a194a23301ddd0d26652742c74f96e9ab887c331fc0b6f8dc21af95720d6870b3f86d0fd7549d9fa78ba73c9749425c2fe5948c940b65c7e260ecd83377a41755c2eb687a4be8e0587bc652df9b068c5605ef9d10d9b5e46624f9b90eb2e36de728657cbf44d1e29f42363c2820946f12d0d0bb9c73241a83423efb1814bfa57000721887b5a5a8c182df717360f27373c321e75bddd18fc76731e4bf0d99e96a0b5651a0cb3a2dfc1c258879b531573d5c065b8eb72a908ee5fd2b99df6720f4c7e3da0e06aae59b71763ca378f22e22e67e8446d7289d4e43782dc43939accb9b1c4f31010d99fdb6a8cd2d22c950e1f49212", 0xfb}, {&(0x7f0000005c00)="c6fd1c037aa4f8c30b5d83702882469b6c73e08ad99189ac430f46dfff56213272e04471183fc3268bc625397a198b66c3699b57a73870f62a4e87b65d7beee6280f249873d7561b44da5b1f82f35878341652c11ae1789aaa7bfc9209351482948eaf8ce561edb765c986532d10c9f575481a4b4d089039f2d715a020e8eeea51c1e62c29cace35de480bbd7f97f7", 0x8f}, {&(0x7f0000005cc0)="2860060b60c238113311fe580568af6d3604f59c56", 0x15}, {&(0x7f0000005d00)="5beee0ce97c71e5d2e67e872abd0afe081eabc8031b3c82f44f69ee1cb4d7e64e38e41200c4a297e82906444a71ed5ecb3a2835b11df924fab3f5a665435798b083267bd18951bb2fb167e6f39edf1aeebd4d6a98cf301c7776fb82ce95fe09c9e9bbff2058d21bcf18d3e375edc86f527ee327c917590494b9ff3baa43140592e8d5471090bf047078c4811544306ea3e5cfa6ce57054a28c834323b43c6ac20c6ef02d9476859856fc00a670b956e34fb49367f84673e9b273626ab5d2f5c4c61fc2271322a8fab5f25334f7d762", 0xcf}, {&(0x7f0000005e00)="73eec7c1d297f8afbd5b7100edea44247775858e92dd6822c4720c2b64c3dd97518afdbe7c9c0101947daf7718fafc9c8b4a41e6c12b3388e391a3e2c4efbef8ffb9847b2e4257e7769a5619b8d846fea9015213530b65811fbe753a5f4e349e2ab54426cd6bbd7ea978034d8ed55fcb293801baa1142e1cb3bb58c7a83cadef8e448fa75c82e3dfd68c092258fc053c74a1e3baef1eecffe86e5e419c3da3fa29771c951b06b91d271e9f7ed04ed801fc3826771102c08742", 0xb9}, {&(0x7f0000005ec0)}, {&(0x7f0000005f00)="b2d42c99a65a34c03450814a010fa2068e8dfb797e6d0b4b5ab165ed041e5e551f1beabd5b74a19cd0a0f8697c17da547837d90365b953738b05ec17f9e13ba3c576e3598502ed6bce31165a839d8827c0d3fe548b2a6deea0e82d519b4f74a1a2a0665bae9db676dcf91b8d5105bfe2608baa0231d5cf5e1ce30c1859f3158d06d29fccd57471b719ead14809ab4a43ec09c8affac4498da5f006d448f0cd7866e798eca3d439388f4cedf454826b0bb336224f813bf6ccc489093b3c5ec2e75d242fa1b127d81924b909284297032b8ebe250cad058b", 0xd7}, {&(0x7f0000006000)="815db902dae6c2bda555ace934148ae1b4bbdca57fcbe51a35c146139e961e61ce3c746b84f05b5c0e18b9c7bc421aee96a0265f5c5a3e70ecc1b458554a3fa4896f3baffa76dd3719ee7b45e47a04869b", 0x51}], 0x8, &(0x7f0000006100)=[@mark={{0x14, 0x1, 0x24, 0x541}}, @txtime={{0x18, 0x1, 0x3d, 0x7dc9}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x78}}, {{&(0x7f0000006180)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x80, &(0x7f0000008680)=[{&(0x7f0000006200)="e0865a616ddce4222cb96ea82db7f132c39c69bb5e5ce391cf35dde146f3b376826ad4e434557475c784f0761b8742c08698de0d1db9354f2de5c175d02a630a4de2a8abf7f104b6dbd18a8191bcf94b006106c13335f1f0dc6d267e813c5cfc01591859175f035d3e33e1cc1d3df86042398053375b5f72a7661562dc5b61fdb55debec3256fb2a4843a13aef5c736166a79a159148d890c40fb9a8b84fb6334957ee1b2ada1ef69a5f5c8eb2d11d4097651bca", 0xb4}, {&(0x7f00000062c0)="19945ec8bacdf6d9f5d5465e49630c4be883ff941e373c3520cbaeabc838b436ea7e1bd4de9a32e46372e4dc610a44b6238c2eb693e4d18256f8a77ea63e4a3fc5bf1b4061966f8c35d2f37e707f29c3", 0x50}, {&(0x7f0000006340)="264a7e8d3eca362a876903746a711ea637dcb37912a398b1a1871ab37bfe7c8c905182e2c4536eebe7ecbf88cdab4fcae9a9c98f1348ac9e91c049c17eab33876bc4633bf89421a86545331fb2d7b52f5cb5ef805ce17851fd5536d5d79256371bc435f71955188faa1e19fabf8e074065b69b7b59db6d5a927469c4613112743c89d493744bcefe679736754204f3f73d66837d0164673af08be209afbf29b0b38ee1f0de02213eab7086368e5418eae097857e95a749d2a17a8d31287448360ff092e71a93fefe89f64c8e9b0a0e8fac99aa220786a22867aea21f77f390d4c8bd13aebdc6172dc082e0d629d1584d75ca327bf0e324341be92a2ea69cd3d8d4081ed8897acc731addcdd9683389e6847ea0c9cce254a56536647951a28b0d227dc12e7d983e5d7e414414c88d1ff46aa8b7b1bdcc5344db582a870fc2749f5e98afbcf659f2c9f6e3d112b9b52a23d139cdddf0d81a7b09d3211842df9024d88a6de1b3207ee20d5bb21967a7c7331862b8e86d9bc0ec74df738d708713f7b7813ede3ce0734c68b02d9e148f17d4ea0cb3379ec22d76a95e893b2c1dd57d79cf227cc802c66efc24c0d4fa8b2c502f34cb3deddf5c3a97c3d08a93cc87fab6fed57ddfd7e0ca26d8d5eca3d0db5d99eb4cf3e4d0f1eaeabc4c48b9e34eafca9cf61d836e2e3d3df8f67aaf3b034a7c800cc9e2071e0548eb5cfeccc431b4dc279b4fbb874940ff65b37b483afa9b92a2fef7ce5fc12abc7dea19c1ec321d04bcbbd5ea9890006d9eeb9a64d0be5febbcb0a591f07d1bbf8985fb3854bcd5874f7a3a07b574d1ea1aa3694ccedeb500f5073bf2c94d713a760d94afde85506e50c70ba82603a2e50d488b896086c8008c037f844bd21f6a280e2e18e33457859b457c3cdc87a7d933674039c051fca181105126e87e040cb172ac49471783984d47accbbf6b93bcdd7e3b12e14d3133694f7f5e4154c3c432f9986650c34815642ce493056f0658b1be90189a0dedb0517a2e584c32733e8f9c371db64417e76d7fc03fb2ce588221318f4cacda8b154e19f781eaa81ec91f02a63ad9ebb7d85e71eacc0446c976cf22ea53e5ae114c61a631f7055aeaba8c96dcf091710a8c2589198bcd5d4b21090c8523cf7cdeb7aedec25c8cc0f7af10bd628ef5a5861dfe6b6e6ca91d3e9d9f5fafcd91a2319fb9ca6b1e2cea90ba1549490620a6b3be1ece91b6be3c674e074f76c738c40acf0e1994eefdcc69d849879a2e156da946c1bb8117c3a95061ae3dd6bb37d79f003c4d02498f20630003ba7603ae5fb094503d06ab19b275e8dec42b61746be9bd662b3785e63a7467ddf5c11ba30526bca04a02a0dc23611e764c61402d84dcabcd4d998054f2e3e5cc3e2e172c91c46eef30b60fcb989b246c2eb0c7358a2e239aa41e836d2877b60b5c5dac2229545a38cae2fa4759a44389f3fc31672a1beca39b5eca283fdd8d4759b5b7dadf650f21df8508d7cf81c390783aaccbef0af6d8196ee97cb748076d51c569717f467aadcc61308acafdf0a58a6d9e923f21072ac84e768aaf662afa9e2c73fe467e593b0986f3676ce9f56e90918401bc3955bc169cf078e9f9e539201162f956c8c68ae4042c7efe3a07c4e4eb6bec755965f6674d7195df68d9e7aa762a780d5fef7b7654b8bd600a7da46d0745e16460a69c8c2fcff98aecebf672730ae6c5d9398471d45e88881f82b0697f21a26c06b3bf1fcf4e72fc8d8a2da4654575840a77f049897507fccb164d0c78ef692833457e41569e8ed0a54d961877f8deb9237c6a4770ddee00e45435476f3ffa545cbdaab829234e0b1dd73c225a4df5b03f8018872f64392f978e4bd77250c4c790b7895037d13b4b0d115fc896f1f1e2d67776995920b7d4396a39fc9e7143fd959494a44d4cd9a9931df34cc5468a49177f78159553bc5425354ce5f112220f92e0ff6c018b4d5127758c4a8023f50b485edfd5a1694ec30a03f2bf44e0ded80d77a54d4090ec76ad4ac42772e010729358d165d4f68ed37d0839967707cdaaad19bae69481a24d1b20c7ed7327eb94227f742d42ee0c60d9f43a6c39accef095e8531860d12af16168094a97948f4bb2c76e403692f8c35d3bc703609d1d148547c5f39218966bfccfd1c40f264f1abd838285ed705103b98311c279ec63c87689a7a2cc57186368c24af66212452110fc07ad590646b02994249e6387d2d15b0ccdb10783571d1463cd7aee9ee288367fe73f600369d66f793f108fcc7b1f05711c941cc6492f8b44c697a9c19b9858ce5f769f95a57eec1d11ef7e2d70a536bb1bd7dfbd9299e16c8f019cccf1871fb4c08475d95bce14b8eec7f74b12000120784ebf1e2197cb7754b728b6602552ba43067eca5bea6753d531c50520317abd2120db5ea5f5fd77a66609754d4b03e82340d9fbee8c4389b0587274e324eade95101ebbd7064612144ccf330397b71fcc5745decf64f9264cf5b5830ae8b1a92fbbb1cc71609d44e53d2ed9aa7c0401bd19ab5079a1e8a03cd909f18ab0c0590fb255e6fb3defaff584cc5fb13d01fafb7b0154e037e5182cc918047e4bd4d01cd6fbcc02d33a57388ae3d80cdc494b5556270f7f22336170456958c715cdb4c13edeeed40f230592b6096e859f9c70b88c710bc72e83c08c35d6a415f8550286889aeda0c35629406b3d73ddaf254e424a3c19ec29282c4402516094823fa805f756b02469df748084b8e82ee87777b9d16e76f25a010474f3296cb4f5b9e75f91535874ee085a9f9a78504f37b1f3d2b67397b2cb2b495d98782b84e02c035524cc274d1501d0d4317b67802c83cab4377a6c7fe10938d2592cae0b110f5c6d0ce831557cafbd4ebfd6c5f69d41820e03b2409fee69d7da5d45fb835896bee7529b4e9d94c1b08eb000f485ac2f348652a16147d4322a1c2e319a50462555135b4d2b4642a0ef62c35ea750311242105369f490600f025b992700ed91230e3fe86fbe7a7bf10526806bb9728498503aaeae2ff28e9235c70ba36d36fb29441384e3896e2ff1cdb7ee481bc526f55db0e08ee09dca577ac7a3f3104438bbf2004acd9336018df6a733a034e8ca0226e865fbc08693e21e8510503408345a930cd697b8a67e9fc79c1eb4c5040cc3195dfe26f9d6600c194a1dc7e8f585f2cccab27305319438ba4bf96469b2a494ec88cafe27f662ceef97cb7d8e68824cfc1873559b044a595ef0fa0f8dd35dcb5263ecd7431cbccf84ef14c5f6f7705a62a3e96157359d66103de4d292478740b9fec14e89dae11e72080025e4196f8bc545a50d78688de74676ec6134320766f2ac583a1c903f68ede41847689001da42fec21fdb542da5f5408972d27cf192e128ea38e85f631c2ede2f71f56932dda8038f94a96de13d87ba946b54ab38f624c014d9c4c154481d97cff3c76699f61134acad91b4d7219005aa7bffed8e831149285a4cb66a63fe3b118b6749b67fc365c753d0cfaa9975d58e7fd6d4a4a413207de15fe6293f2bfd72c2cabd5a0f4aa1f7ecc7bc2c894c858890a4981bd3351607cb602f5ac07cbc9d5af8ecf24c9ae4de7a2290d5d64f7450b4ab77dffa06cd86ea48f6054fcd511a66c3828d442be3b6444b3224176f1e6764142ea8632c181681142361e7c3a8b50f5773748a96decbe99c9fdcb1f2a38468a5109d3a40fcbf128c5a72c6b9a0a39b6d454164d4ff958a90993ffdb6adbade3e05d184e845b002becabe0580528585f62a12af7a34c339d67c2113abdedf24f7a2986764faa4f1db7e9f0b5ab6eb2ebc9bd08e09800d4020066244aae1f57743f879dc07649da03df2c4da7d292caa6991109cc2fab8e6d4c8a770897ea7cafdece206b97214f7465e61df618079fcb6d1fde9b8970407508ed7f7f61a468e87f0b3b7bf2b30d8899214a751ef7898d5dd540ed380e49a0261bd5068af5dd143c3ee1935ffe09f00b673f45c5fc585bcdfd17306dd653f90c695cdebec05df6bd046a7a22a0ab01bac3e3e618ce6505a9921752edf8c1cb3a85b1b32bd0c1fc2fb08611360dcf2dffe6dcc49be2012d0285d9952b3525a16d7b3d0b7b4af306eca1193c7c0d7d9a64c69c3edcb72b0d5af603427d2a708385c30ce42642518cd7d6bccae3c824c14b79b931cab04c43d672d5dad0a071c596965e68247182061c401c33b62bb2ad05f6e5028c3295d0845d3bbdac98379f56b97ba1a069cff275a24f2c4ad32a04637e5d64eb8f09d3430ca8a094806bd65279ce999f5eccda7efc822a9cc71c8c9a5d6f58ec60e0df521e6c4eb6bd8c28d61b4a4acfb6a788563606557fcdb30506dc5bb8c793ac51af942b17efd53b16eab50e8caebde9b596084e49484bec425ba05c1ca5eaecf9cc5df91499a16d26c48358ac3ea1d8be8756d578c35aaec4c0d69d7d8cf17050bb448a246f2daff82b5d4bc409972cb89b0226467d99e9b501c268122d11a73b3fc0f3d777e05220bcb64d8e2552f87de7e138d4c3e53bb2b9a43f476f8747c8b420801ab79261eecf0688d37a114aad5daa16d5a6c1c9476cb301f8625e28566a228d6c2d0ec4bc40f5d25fee3a16763dac9bb018bcc4243b370170da08c92293a099f2687e7091d674b90b52ddce83fcd982f84ad39e23c0433f6a08524a869787dd2a3b70c91ce2be981d6843e52066ffeee29890b16b4513b31ced9a6d3099600235f0fe2aff9f8dd4e3a334438b1fcfffb2392f4990fd08bb16944e7946d564a3c7c988b0f53fdb2fcdc10ed36c0507c9fbc7973a06481ef87793c82f2683c8441d770d0ad4e095dd18736a15bc9facd7ea22691dbb6f5aa311c061e2eab5b242841cc182f61e6e9126d27b18643faa4b268822e21cf4a09c665c9a5892000f4416cd85a066486b575b18318367894a31b61886b051d59bdb14b57b3e4d23274f421acc7326b2a9ce8d3365551507836f09799a993982dd34af070937717c40ef08ea893059f7481b37c32b85a0f9507b8dba9d4fbc1b8fb673cb9f21a4f6d2a45398cca934ca1ebb53db9a6856c6a3bb8345ee2ddf13d7c124500e24797d92ad9b7ad0201814b0b55386ad8ce2e2d88c4d192b029e7dece2c072bd078697b8708442a5059c1abba25a655118e833578f309ed6154b42af341c3eb1ee257a714680b953c000119259c82e4b40756c9a2db3db2a1211a14c5e94bc1fbbc540bac4b7bf5d8008606de751cfaa2778f2f3fb8ac00913eea67a8b4711cf74e4b238bed4c7f549b6905d4cdb082548eff8e57807717c5a614ce5e8e45c98924ebc136ea0e3c88eebaf116fe4bbe233d95f597dbcdc048184f91acbeb9eea9094d60b5ae6e9cbcb55efc06b59f20f772f52a515b2ee264be9fe268f8abf0af449c1896b23101c8c0ec294632085063c7f5f1da85b25520405f7dc171da1f3e0c279541fd8821a9a6ed4e637af5e667452161942b6483f046b4f26318f5c5fc020838ccaf4cb99cce90336f845ae313104601ab0bb67e0d8c5ef4a25baacafe7b0600071bab167f2f809eacc9c5023d245156953ef217abf0513c4af47629b8bd9d56ed02eb20629a1af862001d90faadb85307d0de6f8fe7d112b847b9038f0fced96bbc50380fe53c9c6485c55e52b79ec8c24867c01fb91c588c4e093275bccb83cf2ef048c414b072a0e5c4e724521eb83fd8119f173ee46522320469ecce99b91dd8a8e6efaaff38a41ae66b74ec03f1121e309dbd8bff68c26b7e45aa1872e96cbe3489e8c94555581a7bc32727d94034f8", 0x1000}, {&(0x7f0000007340)="e61aaadb928abc", 0x7}, {&(0x7f0000007380)="69e5fc3279888b6bfb6594a830708f845e85d89732b541d4c09854eb895d7f0a305123d4f7888fba36a5e04bae1f0c9710f0a85921b55d878c9aab3d4cfd637d7047e49880115a2d49a9e01450506be542b93c7a8df3706dfdb0f1c9a749d5fd7c2f4cebf5182d3c5d92835e4ef7e7eb261bbe959c494a79e824692bed096329405c4cfa2ec950938c375e9dcb91134547cd75aab18dc4102fde2870e341aa5fb230cddda3c020d242f50e33bd3acb866d5f0ce19269df28755ceba7c0a3795eca04bacee9a09e45c2da3e2da6e17cfed971cad93a24da12a7ec1536deb9c00f8edf5f9d85382690d43572edd3d3aaa6c969e4d5fa2ffd97a3", 0xf9}, {&(0x7f0000007480)="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", 0x1000}, {&(0x7f0000008480)="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", 0xff}, {&(0x7f0000008580)="dc474922905d1a9f1fe09561c86dcbfadad40bc9cdb8b9ea907c4aa53e43c4b18409c0dface923fea556557e6ec6c62e119be66ddd2400dd770a2ad6544a52d186dcdbb62a0b507055c3a16e031ac2685d87eb40eafa56582f63b9478a3cb16710e8e50ee3fc54f0db7e650c5e88b1058a6b2762673e7e90d6440a6ff240a35d8a1755688a30945f48ab7e3461cdea4a53c5cfe029fed4a5c018d01aaba6f0ad4fb77999012524b226a43f7fee420ce41d8c2f2bce8af40983dd2324b2cdb216b14e3444914709070b1d72a869b6bf6c8917c5d5d6eeddcee7a5c4ce", 0xdc}], 0x8, &(0x7f0000008700)=[@txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x30}}], 0xa, 0x20000050) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace(0x4208, r2) 11:27:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) [ 1101.266654][ T6416] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1101.513575][ T29] audit: type=1804 audit(1594898847.986:3322): pid=6440 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/859/bus" dev="sda1" ino=15891 res=1 [ 1101.761262][ T6416] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:28 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12, 0x1}, {@empty}}, 0x44) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:28 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc401", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:28 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb9, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x7) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r4, 0x4008550d, &(0x7f0000000040)) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(0xffffffffffffffff, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f00003cef9f)='7', 0xfffa, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)={0x2, [0x0, <r9=>0x0, 0x0]}, &(0x7f0000000000)=0x62) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b005) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000140)={r9, 0x80000001}, 0x8) 11:27:28 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xb9, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:28 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1102.530755][ T29] audit: type=1804 audit(1594898849.006:3323): pid=6469 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/860/bus" dev="sda1" ino=16034 res=1 11:27:29 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4ff", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:29 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xba, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x200001d0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:29 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xba, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:29 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r3, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000540)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250f000000640001800800030000000000080003000300000008000300010000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="04000100eb4666aac9cdf683b64af73a121a343027a9069a96215611d7cca3898037a5b45e6005d9650fffba76b2b53f24ba30808ad78064963a588eda8db841be", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000080003000000000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) fadvise64(r3, 0xe7, 0x6e, 0x0) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x40) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000380)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250f000000640001800800030000000000080003000300000008000300010000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000080003000000000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) r6 = fcntl$dupfd(r5, 0x406, r3) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) write$P9_RGETLOCK(r6, &(0x7f0000000240)={0x1e, 0x37, 0x2, {0x1, 0xfffffffffffffffb, 0x7, r7}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000, &(0x7f0000000100)={<r8=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r8}}, 0x10) 11:27:29 executing program 0: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2a, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xba, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:29 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000140)={0x7, 0x2, 0x3, 0x80000, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000040)={0x4, 0x1}) 11:27:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:30 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1103.673374][ T6532] FAT-fs (loop5): bogus number of FAT sectors [ 1103.709980][ T6532] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1103.940898][ T29] audit: type=1804 audit(1594898850.406:3324): pid=6544 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/861/file0/bus" dev="sda1" ino=15894 res=1 11:27:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:30 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:30 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0xffffffff}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r6 = socket$inet(0x2, 0x4000000805, 0x20000000) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f00000002c0)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYRESDEC=r5, @ANYRESHEX=r6, @ANYBLOB="08000100", @ANYRES64=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400018000172947d90000000000746f5f626f6e64000000080003000500000008000100f4ca8e8510411a334c6def1882ab77", @ANYRES64=r4, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="080003004000000030000191080001002fe5282caa433b0cccb8e596f05bce3709092c24608e58a733d85462886c30db17437e180359c4a6433b8463b7d82f15eb1bbd023c8d1fb38093d037bbb99e12cd9974a8767115bc2c82a2772e014d7712a5beb12531faca695bb77eff1e883ff1caca5726e03e7648c39d38b665c716e0713c45292a067440154cfff27ab88c058ee5283a76883a2c2c520bbf515e00a32abb643c9bb334b2b1c88d1d0a79536e1cac7d80ec4a968f9af649c529030011ff2bf6fc6354027a828790cc1a802b41531a3a9c3117", @ANYRES32=0x0, @ANYBLOB="1400020069703665627370616e3000000000000800b503000001000008030000020000d284459e3f23cb14d011e432379536662812afc351406f35bbfa6d7852c50733b54646f2994ff14ce51cee5735ef745d69cc455e6298cdf884190b9a5dbc3cf4efe299f21bf04f1d66aa8108c70cab8f5af18d52b883c7e9f9ac2f62c942fc62ca049c5c5150b748aebde5e2a4354a66b6ea9ff17e875aa477ff31b1592678385fb43ba7c0580bb09b317ea1bd14d17f9129992479e9dae493f26dedd3f885acd4"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) ftruncate(r2, 0xcb) 11:27:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) [ 1104.533919][ T6564] FAT-fs (loop5): bogus number of FAT sectors 11:27:31 executing program 0: syz_emit_ethernet(0x1be, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x188, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x28, [], [@generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:31 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1104.576156][ T6564] FAT-fs (loop5): Can't find a valid FAT filesystem 11:27:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000340)={0xffff, 0x0, 0x4, 0x8, 0x8689, {0x77359400}, {0x5, 0x0, 0x8, 0x9, 0x3, 0x7, "e5f2149a"}, 0xa4b, 0x3, @userptr=0x8, 0x3f}) ioctl$TCXONC(r4, 0x540a, 0x2) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x482040, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r5, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xac, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_LINK={0x94, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd441}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x29e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x57b2165e}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x800}, 0x400040cc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000002c0)) [ 1104.723852][ T29] audit: type=1804 audit(1594898851.196:3325): pid=6564 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/862/file0/bus" dev="sda1" ino=16289 res=1 11:27:31 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:31 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x8, 0xfa00, {0x0, &(0x7f0000000100), 0x106, 0x2}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000280)=0x8) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40700, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5c9}}, 0x10) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xc2b, 0xa0000) write$UHID_DESTROY(r6, &(0x7f0000000240), 0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f00000000c0)) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@private1, 0x65, 0x0, 0xff, 0x1, 0x0, 0xd38f}, &(0x7f0000000340)=0x20) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',\x00']) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 11:27:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={<r2=>0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x5}}, 0x10) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000240)={0x2, 'vlan0\x00', 0x4}, 0x18) 11:27:31 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:31 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x4c}}, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)=r5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r6=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r6}}, 0x10) 11:27:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0x25, 0x7, 0x1, {{0x18, '/dev/infiniband/rdma_cm\x00'}, 0xd8f8}}, 0x25) r2 = syz_open_dev$vcsn(0xfffffffffffffffe, 0xc4b0, 0x240b82) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000200)="ced2f15c509681264e0ad5bd7cbbd3266b50ff3c6f671daa2910ee7ec337ddcbb70425e05e5bbc7d33b62dd9036c4c460a47e6641df1da220bf35fa47efecae410f6b40558297abaa4a1f6b66c8bb66fd9c7a67af0fbe71824a27517e9471b2d77d03903c0ac5db0400412969d814648b3862a7d6b76d2e2be59a353b7859cacae9c3fe7c97c25e2747f61e17fbbba7e70229873"}, 0x20) 11:27:31 executing program 0: syz_emit_ethernet(0x1c6, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x190, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:31 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4ff", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x2}}, 0x18) [ 1105.472916][ T6625] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) r2 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='vfat\x00', r2) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="8bffbc82715eb6f4a4c2", 0xa, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000ac0)='ceph\x00', &(0x7f0000000b00)=@secondary='builtin_and_secondary_trusted\x00') write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept(r3, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x80) recvmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000040)=""/6, 0x6}, {&(0x7f00000002c0)=""/97, 0x61}, {&(0x7f00000004c0)=""/255, 0xff}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f00000005c0)=""/120, 0x78}, {&(0x7f0000000640)=""/220, 0xdc}, {&(0x7f0000000740)=""/149, 0x95}, {&(0x7f0000000800)=""/134, 0x86}, {&(0x7f00000008c0)=""/118, 0x76}], 0x9, &(0x7f0000000a00)=""/129, 0x81}, 0x1) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, 0x0, 0x63) 11:27:32 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={<r8=>0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r9=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r9}}, 0x10) [ 1105.747964][ T6656] ucma_write: process 3250 (syz-executor.3) changed security contexts after opening file descriptor, this is not allowed. [ 1105.979162][ T6675] FAT-fs (loop5): bogus number of FAT sectors [ 1106.021000][ T6675] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1106.202245][ T29] audit: type=1804 audit(1594898852.676:3326): pid=6681 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/863/file0/bus" dev="sda1" ino=15894 res=1 11:27:33 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x2}}, 0x18) 11:27:33 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4ff", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) 11:27:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @private=0xa010102}, 0x10) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)=<r4=>0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000000c0)=r4) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r5=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 11:27:33 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r3 = semget$private(0x0, 0x2, 0x12) semctl$GETNCNT(r3, 0x0, 0xe, &(0x7f0000000300)=""/4096) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0x1}}, 0x10) write$binfmt_elf32(r0, &(0x7f0000001300)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x7, 0x91, 0x89, 0x6dfaec1c, 0x2, 0x3, 0x0, 0x125, 0x38, 0x348, 0x1, 0xffff, 0x20, 0x1, 0x9, 0xfffb, 0xf801}, [{0x6, 0x3ae9, 0x0, 0x400, 0x4, 0x2, 0x8, 0x8}], "ddcba36951b6ba8472ec7a834de32df05da654f9faa46f1c7717ab5119", [[], [], [], [], [], [], [], [], []]}, 0x975) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x8000}}, 0x19) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r6, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r7, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010102}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0xc}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40040) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGDEV(r6, 0x80045432, &(0x7f00000001c0)) 11:27:33 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={<r1=>0xffffffffffffffff}, 0x106, 0x5}}, 0x20) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0xfffffffc}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x2}}, 0x18) 11:27:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r4, 0xc0884123, &(0x7f0000000200)={0x6, "d341f18b40b7f0a1677f983558eeb45ada918e8c715ffe4ee2b510874fedec184e5d2ac36a7415be87bd96bf0093264661000e926c00", {0x8001}}) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x58) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'wg1\x00', &(0x7f00000002c0)=@ethtool_stats={0x1d, 0x9, [0x8000, 0x1ff, 0x4, 0x2, 0x39, 0x101, 0x6, 0x80000001, 0x4]}}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:33 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc48d", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1107.143494][ T6724] FAT-fs (loop5): bogus number of FAT sectors [ 1107.180235][ T6724] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1107.414018][ T29] audit: type=1804 audit(1594898853.886:3327): pid=6736 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/864/file0/bus" dev="sda1" ino=15894 res=1 11:27:34 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$cgroup_ro(r6, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) 11:27:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={<r5=>0xffffffffffffffff}, 0x106}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="6fe7af8fa9fd56480000001000053a070000000000000000000100", @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x78, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ad75deb2bb61a89f5e25548acfccd256"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_PROFILE={0x6, 0x2, '-\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, 'vlan\x00'}]}]}, 0x78}}, 0x0) r10 = getuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@empty, @in=@multicast2, 0x4e23, 0x6b, 0x4e20, 0x48, 0x8, 0xa0, 0xa0, 0x3c, r9, r10}, {0x30000, 0x9, 0x673, 0x100, 0x3, 0x6fa1, 0x5, 0x8}, {0xffffffff, 0x6, 0x4, 0x4}, 0x2dcfeee2, 0x0, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d3}, 0xa, @in=@rand_addr=0x64010100, 0x3500, 0x1, 0x3, 0x5, 0x9, 0xfffffff9, 0x1}}, 0xe8) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 11:27:34 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4f5", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ocfs2_control\x00', 0x40100, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000004c0)={r2}, 0x8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000500)={'nat\x00'}, &(0x7f0000000580)=0x54) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$SOCK_DIAG_BY_FAMILY(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="64020000140000012bbd7000fddbdf2514002f00010029c3801a93e25a3862982419da7d6ea8ed5c3a2a152bd7c50197bbf368fc6ea97f234e0f4bf50b75380bf10025000100ab126f440f0d6bc65971de4855adafdec251bcf35b0f01040000d0af08244c6c2800000027000100fffb69c388cda56d1a48638b287140f455e7240d81673557c566b9d9ca591a57ccad2b00fb000100e084a75f0f2fa9357b038d5c2ab29d897f60c59db5c8f98895b308e6828f0a8b5894a4b8099127e85b786cb2bda7e43daf2c7c64f25d08fdbb7ccd820f9a6b8bd0a898eb0d61a689ab0b494c83adcd53cb7320fa8ce48db5d4a875546aa896b776c5d5dfbca423a68ca67d1a8bc6e714bcdad9e9a848599af4c1b3e9658ebf83b292d7aa63efd56f660661cfbd030fb18849371cb0de43037c6fbe796523d6be530f5d6e126b12a4ad1398cd9b75c67abf41299f0ad123e5da5ffcf9077ecb45cfaa89bd213af5a9cfd8f94b8dbcfd0f408e12607c03be80d62d34fed823f7e307e845ccfe5a1220cf201362c94786a12a70381e61b5f40096000100f292f0ac1a800d385c428be2b21acc38c986f581138e3d0d978551d6a56d756a08512c1de85750ee0e14897b16de9fcfd03bd2b0d0a93da2ec0737735bafa149f5bd64741a0f00c2d402fa03b50cde14c2b658abf780c3bf67c7da85ecb4c48bad537d1064dd27f5b5450e8f90ea26b4105873cf1fa904a8b16e6039438c3783e4d60d9d38277592369c904e6054ff3be88a00002b000100502a17d2403f073f79ba39014b9935c6c891ab1f589c043b0dd47de0bfe73021198d71c1521776000f0001008c009bd955d6cbba094c75000000"], 0x264}, 0x1, 0x0, 0x0, 0x40000110}, 0x20000004) 11:27:34 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4ff", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) r6 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 11:27:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=r2, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200697036657273000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="5eb14f93e12a5401e3a6011c166b24dc5a20106904000000000000001c8384996d368554c8573ac56fc8fd3af98553d6bd56fc30b9ca10889cdb5473d1cd5437a3b857", @ANYRES16=r5, @ANYBLOB="110700000000000000001f000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r5, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x880}, 0x4000000) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={<r7=>0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) 11:27:34 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, 0x0, 0x81) [ 1108.311105][ T6780] FAT-fs (loop5): bogus number of FAT sectors [ 1108.322161][ T6780] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1108.563711][ T29] audit: type=1804 audit(1594898855.036:3328): pid=6793 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/865/file0/bus" dev="sda1" ino=15779 res=1 11:27:35 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:35 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000200)=""/157) 11:27:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x3, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) fcntl$dupfd(r3, 0x0, r2) 11:27:35 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:35 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) 11:27:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x3, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100), 0x8) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x20000880) 11:27:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000a80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000380)=ANY=[@ANYBLOB="64010000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250f000000640001800800030000000000080003000300000008000300010000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080001001f10de", @ANYBLOB="140002006e65747063693000000000000000000020000180140002007665746831000000000000000000000008000300010000007000018014000200766972745f776966693000000000000008000300030000001400020076657468305f746f5f626f6e64000000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300020000000800030002000000140002007465616d5f736c6176655f300000000004000180040001802400018008", @ANYRES32=0x0, @ANYBLOB="08000300000000003000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020069703665727370616e30000000000000080003000000000008000300020000d28400"], 0x164}, 0x1, 0x0, 0x0, 0x48091}, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000040)=0x12, 0x4) 11:27:36 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1109.501930][ T6856] FAT-fs (loop5): bogus number of FAT sectors [ 1109.512915][ T6856] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1109.741886][ T29] audit: type=1804 audit(1594898856.216:3329): pid=6856 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/866/file0/bus" dev="sda1" ino=16306 res=1 11:27:36 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:36 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000100), 0x8) r6 = fcntl$dupfd(r4, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4001, &(0x7f0000000100)={<r7=>0xffffffffffffffff}, 0xda7ab5b9827a5016, 0x3}}, 0xfffffe65) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, <r10=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000010008105000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r10, @ANYBLOB="08001f0006000000"], 0x4c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000020c0)={&(0x7f00000018c0)=ANY=[@ANYBLOB="bc070000", @ANYRES16=0x0, @ANYBLOB="100029bd7000fedbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="1002028038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400060000007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000004c000400060007810500000002007f00a109000006003f070100000048090d07030000000400f709ff010000010002403f00000009000306ffffffff0100808176000000020004030100000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400000070003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000800000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400ff03000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400000800003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="ac00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400dc00000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000700000008000100", @ANYRES32=0x0, @ANYBLOB="f00002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004009e7bef4640000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b0010280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000200000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400070000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c00040080001ff4bb02000008000100", @ANYRES32=0x0, @ANYBLOB="7400028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004004500000008000100", @ANYRES32=0x0, @ANYBLOB="800002803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f726974790000000000000000000000000000050003000e000000080004010000000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="2001028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000500000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400030000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000700000038000100f2fe01006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040006000000"], 0x7bc}, 0x1, 0x0, 0x0, 0x20000004}, 0x448c0) 11:27:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000100), 0x8) r5 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) inotify_add_watch(r5, &(0x7f0000000040)='\x00', 0x80000b21) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000000)={0xb4, "c48bc5"}, 0x6) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x3, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100), 0x8) 11:27:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) 11:27:36 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r4, 0xc0385650, &(0x7f00000000c0)={{0x3}, 0x8, 0xb37e, 0x5f}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_buf(r2, 0x29, 0x2a, &(0x7f0000000200)="9ea7aa2d61cefe03b120db2b5a355e91b68f6b85f512e14f41403e2b91528b7f3a299fb871ee1206e87273dbd1b6af25de5725c90dfa07577edb65bfe186673696f62e20dac0c1a72f0f7604a69c32c7550deca1c5c1ef598fa53a19c5d1296b5d7168be73f26bf241a2ebfdbd0ad732b28a6840de3c49e4fd463e335304cc64799280245f61bdf04f7b843b5442e6b91f09205feb9ed5f8ff14b3ca5af4025b36fa5cc92ec794297ef44f762c4880afbdf32dd0d1f8e1501eb8e7b6dfd8b08bcfbe", 0xc2) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1110.459629][ T6891] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 11:27:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) 11:27:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x45c) [ 1110.588102][ T6912] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x3, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) 11:27:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1110.800193][ T29] audit: type=1804 audit(1594898857.276:3330): pid=6928 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/867/file0/bus" dev="loop5" ino=1069 res=1 11:27:37 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4]}, 0x45c) 11:27:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:37 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={<r1=>0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x2000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f00000001c0)={0x5, 'u7<'}, 0x6) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x100000}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet(0x2, 0x3, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) [ 1111.147450][ T190] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100), 0x8) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={<r4=>r0, 0x5, 0x40, 0x101}) ioctl$SNDCTL_DSP_GETIPTR(r4, 0x800c5011, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r5=>0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) fcntl$setown(r3, 0x8, r6) 11:27:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) 11:27:37 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet(0x2, 0x3, 0x0) 11:27:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100), 0x8) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={<r4=>r2}) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x2, 0x8f, 0x3, 0x9, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r5=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) [ 1111.484032][ T6985] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:27:38 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1111.656902][ T29] audit: type=1804 audit(1594898858.126:3331): pid=7001 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/868/file0/bus" dev="loop5" ino=1071 res=1 11:27:38 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) 11:27:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100), 0x8) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={<r3=>0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) dup(r0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 11:27:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socket$inet(0x2, 0x3, 0x0) 11:27:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000000080)="b7", 0x1, 0xe00000000000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCOUTQNSD(r6, 0x894b, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r7=>0xffffffffffffffff, <r8=>0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x6) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f0000000240)={{0x3a, @local, 0x4e20, 0x4, 'dh\x00', 0x31, 0x0, 0x47}, {@empty, 0x4e23, 0x1, 0xc9231cf, 0x9, 0xfffffff4}}, 0x44) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000200)=0x401) write$P9_RMKNOD(r4, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x20, 0x1, 0x8}}, 0x14) 11:27:38 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) [ 1112.050043][ T123] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:38 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc4ff", 0x198, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 11:27:38 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x45c) 11:27:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$alg(r3, &(0x7f00000043c0)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000240)="736524f9cf5e191f1ff35c2bcf4a7c5e666d2195759ddc378f65c32c9b272e15a183b7fc86bfcc6edc4a02fdd3cd640a31e0bf8fd25f88665c9fc99d3a6173c72caa37568fc218ee7e0e02c6690dc0624a46ace1", 0x54}, {&(0x7f00000000c0)="5071b286d539a1341fa35dbed2d44be997eb8b43bc7d6f4dc331b594c2bfdc16f77843c7ada415f15e6ea2bc4d9edf96b9b0d294b87439173543d866e17bf6", 0x3f}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="13d8117af39a247093e343e5cc97ef941bd6fa128ad589302792c37761281017545f8dd8e6352c453d5a87139341f4d43963f9ce213ec7a6ce27189fbc26f84cd10e5823f34ce1f55eafc68e11cb04133af9e577413f90474e7e9f7b981f745fb2bc139cab7edcb4dac2c7712841489a51f0a14e46e267d1fc171c706df7c323", 0x80}, {&(0x7f0000000140)="bf012e19aaa1ce8356fa03", 0xb}, {&(0x7f0000001340)="ddad42d04e01d7945efed9995159bbd7aae5f62517e45595323c1d9c2304bc2be29b8ff63bc51667", 0x28}, {&(0x7f0000001380)="7d76703f1a606ee1f880984772b185326be72d56f8a3e5b6a64bf10d460bcb616a9a492cd24825d3cf0a2a1b5ab3e2fce28d001f5a78a00826979369d3f45f6a61c40c5c8f3a78e7fe3b6942a2fb3cac958440facbea6db8937f47452342d87dc4fef4054a3ce8430013a7fe7cc02ed106ffb02d50508f858e74895039e8b1e61d1a677a1339659f39aa8e272d335d7c88f637bafefb952acb8184953b2c46e82abd1f5ab0aed4c5226b20a7c58a0fa45c70901f2da50f22ab5e4575aa235144485bd2fe06a7fffb9b4d5ae2474fda1902682befadf6493bd4969250e29ec1266e30651d4d379f9a0823b075", 0xec}], 0x7, &(0x7f0000001500)=ANY=[@ANYBLOB="980000000000000017010000020000007f00000079916786d1e5cd84dcc88f6201dea360320562788542ac4fad5a40ce3e742b3a917a5f2ab24d42b4edad8f680a18a432fb02ff8765d6f40dceb391ccdca535427417631359485ecb553fdb46ba3ce23804e68af5b007bcfb540ccfcfef7ec1951e9a86c4f1e093eae7d2bd96a96dce1a9814b82d7617bd3a5390b1325c8da90000000000600000000000000017010000020000004b000000f867950f29f155485c14f522bcbe5ad22333727b6e70a5a9d96d60a8c51867b577aef1f2b46fb8fa2683bcb98105764b92107588c5eff218797f1213801a523b31aac15e9aab9c47398801001800000000000000170100000300000001000000000000001810000000000000170100000200000000100000f658d7a382cf3236e5853c300c61ff75213a62f3280a60ee9640fab5fdfd05193d87b58bf1ffa82dd2f27344a01633aee1d9986bfff4ca2d5d6a72df2b4e7a237c63aa39b68b57d32920ecfb84f504c7cc241320a9715d3eab6cef5d03d86beab37c5c5f8f7b12be051c03c024dfacc93625f5e5621190a676f68efe4cc1480a7f604220eb721864575fe7f430c92585a7428212bb5365bb6cf431d538faf5a5ea602c315a8342c81554fb7091b89de31d62af48999b7d93c728f3715d931d3a6419530cb0fc3e11d7b0bcddb44ac43c981301d9799d39d7c16dd275f6f0f096ef2e1db25af66230513dc2004235ffc909080d35165a51fcd611751f9c7719eec27242a91907675908707d9ad8360d3f0c6be128dc6b811854ffedb74346c79fafccc88a215c67dd778c78b5b3f89230e5bf0c4ac61d4690589012cdf44eebf8d04cfa403089036f8acefb910cd15e9ccedba81fe3dadd9c1c84f3eb012cf50062197ef567f94c76401498de0bf921a6be4a0eac412e3c382d3581210d5b7f46d25ad56b1114d7dba5f6702065d2922ed8033c0bb04d73f708b892ec57a94e6731f6f0dd538a91dae7a786ac3463ad42e79f4ed9c0c28e5b6d4750fd6f181e74d82a3162da667822c8099d0ad471ed6699306f93e8f7b67bf30fb5a368aafbccf894680ea9488db799578b6dfbbae2d029da16ef70f1a0d0fe6bd6d6b96fac1786445b9de648b7dfa51b9cc018030d2817b3c88a062dfc8a16c6cb4fbe0ca889ae7c118b0149cb2ade6c66a32ef137ba541f84c3b0a518215e7d03c347c46e1bf6d5b124c34530591173e24dfe9e104a937ce94179b88a753cf756e110c75054f4a67e2bef1611c22258b4ff4d01a2163ac50ca6ffc8e7e3b73bca95dc11135f2e73d500abea5b0e2ba07a2137400a60206bc5d45fdc41344517d59c6edff50f91823cf39608219c17f4b316e25b701b8c4516994eb0c83d46d6058984a04e61be43fedd55d3819378710775dd1ce2549acd0f93746a0dee195707e9cc1d7b6cc6db505a05015b0edada04e56d8d30a20f7aa724610f03f9accb2cc468f05fcc31560b7073b3bab525f9dc678f5753c97a358cf43963db7e08998cf953363e72426bc07986453ed43ad3a4809a8348409daf568a293a218c97b1e15d931f8827e871d1dfb913d5695f217e45f9478d7823030ac77e1542066b86937fc5188cd2bdd5250249e11292e6ba922e171e075cc0d6ce5b96712e66c10f0ff74614a151e303502e0367a55f702ff07e8e6e42f81e3abe9c1ef27ab49e3d6e6e702339daad1aabf55e634bcc0241a9e26ecc7cc4ea3aa220ce73a43d200adfb543d75cd3340a3b7e929b270952dfb51183a6460cabcdf0400c910caec9f99215d05c62b4af6f3921a74c45b2e489776dbb5f4b546f03e701a878f863c66dc75b8ebbf56199ff57faaef2eaeaa1337761281533476b7f30cc33020e28fc75f74c80adcc2bf4ab98665ab285a488a5a4616a409cd7a2b1fea9703dc032e4f0770c2a965040d505bd00d2b6f2bbe4231edd1875f0b201ff6141d05ae4d3d535f737b4a65f13bc7ea1f00f35f4e8220746ab82d240a48586602c2f466c2859b10a503bbfa7b5d9d161d0a5619b0dd228b23ee87ecff57067c600d31b8904dc73f33842fc8938cdcf5e81e24e4b8c27818a6d0d806ecd57965b25ade8d888c45923b9a9be21706a69659236df36c695d40a2cb7e5ee979841b13a477a7ede441c7491229605758081ce9b2a68a0374f441bca55dabc8320744498fde9808bc9ba25e64cb16eddd7acf67e0ac9150f587984a9b6ffd682a7af99a6ab763031c1a7bdfb017677f28b6a5d859fb496879904ead568620266f9043e0dd067a19efb908f707fe6ac62b3f30c04aacc4b9a0de8d5e49a5a395fba7c2a1f0fd6af9e8610e786ce784221080d6fd5f48a0f09cdb29d868f0870d9494973da54ebb4fc81ae019ae1c144820f46ffe7716e1ba7fcfd31a4d483004565305b8a0bc7ee32beb485465e71a5b86742468014a885e8255ab8ec80cf74ac3bd897dd972455b712ba004f859a522ca37d99a507c07bbe4256883ad7b01ae14739c5fc036545f7d6a5cb51415836d19ae86fb4a2ecdaef0e359a0200658f23af3f1dec8da51c3f74beb28bee8fb56a9dcc69a2fb48b583cc729c94b3c875591879cdc4f2ae07351a372fc78013d20b8ce22e2b41d280821077b840a2488322bf7bab6a17ac6360802b19bb32cb17b1d63225e6591619852873fd4bcfca3a1c659bf4b57ca22f1107d44464a090bcd25f1276d811fac151d1fd72109c01bfaea138d9a3d703b30b7fc5fe1d345b346485e2afce8cda8f3ca225106bda7e99e6340eef702431a1009773095c3b24c3d54b22302e40fd82d255dd929dbc4e23a6b7c88417daf87c5a1d1d926d92dfe3312bdcc9a7138b0c77bf58668322c63ed8b203a9c8eb73e8d56f4da7c3fa7f66f4b3a8096a5d9e73182089e4b4cf114da73860e942cf2bf1b762016edcff8a9d5df30ec1ff3bd93144c1ff2cc00b5c5c0c00f8f2178bd3d179ddf02b4552d439e0c27e0b03a428759d092563e6ac6faa6a4c3e1d75a6c0b1c59f8409dbd7a7bd04a38d17d6d2b7e3b3a49bf66f96ef4e37251acb22cfdaa1e3404e5a4afc3ea811c95c19fe7f91b2878b8b7dfa6377126382f8b8224f422b82f88ff9738713f34a19ffbd79586e8a4c106a9a667f36c22e69c3f080352e788bcc31968f5287e14dd94112993c6fcbaee96c57a4b774837e5275424005f09c08e33d646015fe702bb3279e79a2e901490cbaa4217603b92d7a9eb71d92c7888d26c0f3484466484e1eb2ea1a37061ae4d2a1f17b46fbc4cb240f3314314cd031cda6d0422574c9b4e97fe1fdeb551417111beeeeac7336d8358aec5824909144ffc14fb15a5e88ff8a999df9d8079114d0652a03f66db6801a887a0e69ea204c43d577a53ee3404453bcf2bf6280afbffa3987094067ca6c44c17aa57ceff758715627e4fe4c59eb048fbdc66b855e6e56dce20d137297c08b96210cad86c7ccbfba53fe0e35829e46b023faf4cfc53bfab1cf9bbc0b36b3c6c469d425bbce0b782925cc3197e798618eaa4a964fb3a1ffc97d665a8da447e8cef68e3b6c81d3822dd0f7347447e290c84e533ac6426e06564d0062d5ad11638ccb767d55f5810f0bd8d87daa673e10296c44f722032ab3362ccec6dd4d7c5c0d220e4bd806b258dcfd2d9f0ad010ee543d7312b31f260e5f438c90481a817d6e97bbf667af3134a48881ce8fa562b5fe32ffe43007509d6544717798363b023362896dc0dc0161772925825c616a2923f2d8addc0340d5278a46b68c8b79a53dfec2eb533712c168168693ddc4bd7b05c1b57fad33b8589d1632415b5959e4f6a7499a3dff3b5e812234e24c535a3e969ac5342323d1f223a1ff6db8a0cfdc6326cabaa69464c0038ca7437910da41dd9a3b8c096f72a76e99bcbb80cf0cb32cb17a253833f4ef591379a4029f6da302cd7520edf30d5fff28336e46d8c9db49eb9d9665483bfd00c9d5145520c610210623e408a106eba971580e3fd9d00200aaa27270add05c4ac67e55a72a27be6ea75e7e1786ef1eaf80b4a12388228630954364aebc036372c0598b0174cea91be739a5f7b1bcecd8c6fe8488bd1f016c1cc4c76cbe2e1190ad89d8c0e755eeed4d999088a5afa253f36f20472786795c3823247e0ed0e6a569afba804175f9863ae917ff6a492daf57c2facab6fa48675ee64610f1327aa74f7190ca5ae3f382ef7f502c51d0a0898419a298cd6de2b8a503af556f66a669c8e0e3aefdf48bcf23884a6a658f9d480ccc0e0de6549cbc82162a8462e0c8ce539708146bd39c71f31cff83a689d0d26626ec3cc22a04c40e7bfbe8bab3c7b2fe3669f1e51e7aff43df6c5ba143eccc9c85e04b09e68b7af62cdfb2131a2f1176a3eff5d83a5fac4b41f22612ac99d9b0200cfaef13f5b4fde3ca00eb091defa7b528e80619ebd484cf09a71cc259b173222f3812d75b7492648e9b79c0c7c4b143a9ecc6cd496e0614e7cb9772643d5e7466263d436310fc9972973afd8ba080937af15716dab7d04ad744a41c302a32faf8d501bfe390423151c7319fedb63126529f2d6bf97a6742164d618e98bf19c70ac7055d16550b5d402d2db348c9ae07750302f691d59152e0b296458e30b07e6c6e28a2318a920fdc827c27f8b4cfa0aad2cb615a5d7102c45e3dba7edf0194f3616e4fc944ba8d5affbe050bf3074873409701c19e8a439e1fb9add669b26bee0ac0c281a0c9fe8501bf62467874dffff0264bc425b583354e24bb89c9cd3123be028b6711267079261a0106ad535522ab689215c3291ed1be0d4a08452316fb00b2e162d6711a3552e21ac22386887850ff23f96197766c30a16469391dc08382bcc9cef4102284959bf3bc2abcb41c914dfbb10a6f7bb1f98758ad0c5522b60313dd466ffa35f99347078ff084bdfb6ca4abdbcac9e72902841e78b4b4b5ae0fbf2ed8153f2eaed57b721f4648f287f11cf44b64ef9ce5e6ddd0073b39ce4e9d897c53caf8b5d0ee837deaf7e06bffaee321296c74a90f47cbaad74f76c96a61cd14c8b843b812b690b762cd50915e4e4561d2b9c30bb9accf5f8e900ca9e140ae7aba66a23a980d865f169f49951aebfe4c91a5291368eb905daa524582ece545c207473ce007972fed89dc60d6468f919ffd5a2d26f320afebd46cd34091e5d56c57243e25068b72d5fd067b8c07e11f2ce0a5b6de75d795cee75ea967d382378a9def8d7728804ad175e0dd0db65cbc1c7619350348964234cd6d4ac8ae0ba443afaeed3a7b9c02a44854c17e0bbd1cffb1ca3f03dc1655a0b80313b4f60e44ff1f6d2f5883a2c34ce329f85ea175dd089c882a26f94548e0b07dbaaf19c434800447fe62331fe3687088ceb4bfa5b364332414cff9750bb4a81df2d840006dc6b26b9dc57140e6b9600876c96997cdc68f2ffa5a05744529767c955b5964ab5bb7dd160439e75f18283d9782ade4373f4f4bb982ed2e521490c61eb504428e2fd623b40595e513881179f3f055b8469f207949013e4452adcc8a715438b4de5be3b7e88826b126bbdedbb5478028e6970be167dc45bf39483eaf726a96c8a3a1cda9a43cdf3539db465b3ea857f9cdfbb05372c3c54c3bd49a431100cbb8e8242d9c89af29639848e220c26d73169eba07d9cdbef988e70be96b6abd7fbd9e7fd623e57455be3018c33f8b8b04f5313e61b7e39c8924062c8500ea7ce05e3eabfcadabaebb9439050b6c31d74067c0e68a74c2af5bba789175c5ab85b7d383fad42e590e62417c9ba52ddaee45e5ac48917c52c6c7f55f5f6d15be24d928c6a5dcce5ea83081e6646fbf6e1c4c7658f6c0a679fbea16b76753620ce61f37608b0947008a7170ab3d0c70321d64e764b79b4acdc34d618fead888435e5122cd0f5764315cb8cffcb47b1d1cd0a27d16b014a6c3a234f610b54beb8496882ea2a0feae1bffeacc1f4fe787458c5695153546f6bd0c287093e42e8cdd2a8d9dbcd443ec337a5bf439c5b0fb19588f5d58e57e5bc37cd0d94e6cb4b66054524983f5de45ffd34a6b5ee41264f8729e9eea7f258d015b4cea8c17776ca65f0d3b7fcf2def2e0b1cd4f67b0d620da0d89d7bb4c432b0f445fdc906725634dfe2e5aa709578af3e4b5d5ec0e53743b642d4d334c413313524b8e1359eb8e1d1fc89e4cbb6c1d5d6688a42428966735f99b631620000000010010000000000001701000002000000f500000057ee786296e2296e87e180f65d3ebe08ad1bce7f28ef2216cb8bd39b94af1e17faff7c24545aff49731ed1ae172239103f04341af0f24e52acf61ee95c3f51be37d0fdf87330107876344ed8cd8e2aabfc89930e39f2e36d317ac06ef1ebb731092e3ce0af16053d49cfe4c4eb59fbfb53f23bf9a55d217c33e3d43cdc4e8cee72bfaea1064f224f510d6eb83b9c67e3ea2ef6942d476afde07c39e08fd74522459283b49c9484cf8f3b423fb729c9cae19085c6d372b515fe59db372f22a0b2f45857a891bf1e63d959c0c1a8514de1da57de46ab2735c3a8f6819fb1496237a8c73368482c50f4c274e153aa58a98887f454d1a500000000000000180000000000000017010000040000000500000000000000600000000000000017010000020000004600000082995d5efb6eb7c84373e254bed7612e0fd9b5b1ec277e6d031401aeeea16781d2016d6467935ff4ed9aa7cd9f0fcd70c2092d7a3b7c17ca8135ed8e58ca1a409375ffd83563000000000000180000000000000017010000030000000000000000000000d0000000000000001701000002000000bc000000c4c62a9efaefb9b66267329f2cc5ec8d4499740826951241fb629bfec98d68db4b7839ec42a279da7aed1f4922a131349b603627be49b58225d12da07fce55b0e494407fe9a641bc621c246cf2f2ce231fcde2600917e03fabdf18cc00860f1fdade3df3450c11b2d39c23da112524507786ade6d6f2512369f45f50e0a29b15af7a1c561b0ee8921c598cd877f337b1a5400415cab1b3a54afa62878916f179777ef74935821425177aad25c393615f6179375905d472806c48121b"], 0x1398, 0x4}, {0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f00000028c0)="f1eac42b5013baf1398c2560c0cdfbafb52ef1c437f3e3949912fcfa813fb9c1c654452b3151eaa272449284f43f51321db1", 0x32}, {&(0x7f0000002900)="07e9183d95d001684b686377a61cee78100ce1071ff2cd20f5e9681b4d4591a0270e46e3eb83577db541649169ea84b2ca5560046ffb9751e7411f9e2ed5ec68bc4172df4bbe9a4666c37dcf721820804d76ed3f0c24e6ffb6b9a43a2f932c9de226", 0x62}, {&(0x7f0000002980)="aef78d5c92abef789dc286fd7b467d11c6966efc7349f161eaa26023e109e93cd181a93ac92d4bc9c716dc83c477d8f1fe070bc8dabc8a986c7bdc298462f0ec42a7e7fff9a748d392645f680650d2084ec3198ec805c9c1acff7cb4fed6a0168a42013b955a3854defe2719e22d59752096e8a5fdd1da82a9e38e2a6c7bb3e1dd73419b25d9f561552688dfea65344b5b5e322a06ec2a0e809520f4c5ccf51d9c3c0c7c33a604c226e0c648cd18df83186a5ec646d71b3fe98fd0cdcee442352fcb83d2e111e6895059924f16b0ad65bd84c4e11dd4c38656852c8069642e753204c4cb23be3668af0bd9f7140b8d1fde", 0xf1}, {&(0x7f0000002a80)="9b27115878c993ab2332b10637c2e0ee707007a261335962cfb4844065b71d", 0x1f}, {&(0x7f0000002ac0)="a651149b8c13665691f54bb2d811764ec3df8133c5025415a54a72f83ff3ef4b531cf76896abd9745b6c317df0b10a961fa7bdd96dcef8a881bdcfa2b0ffdf385227eb5e65e578252ab146420925a07bd965e58611a1d94f4e26c47119f38db9c32db42fdec9b5f7ddd39277b1f78d8fee330f825b82611e20f4e6f33ef24fca23f0c3ddaf9fd164dcb242a594b43f2b04a5bba659b456242d6f54f641e1eeb4124dd44269186a1316d5b9c910d7f938c2e06a3aa38bbf07706795ef997e81973fd74e884d76e3afc2aa603fc37da3e32908b1", 0xd3}, {&(0x7f0000002bc0)="22dca8c1f9264315fe416fedeb1212c30f51a05e20477f", 0x17}, {&(0x7f0000002c00)="cd2d47f1da9f8c2a51a4d458b8ca568bbe4c34", 0x13}], 0x7, &(0x7f0000002cc0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4000}, {0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002d00)="746bc68d8c9c9a1a30157d99cbeaef0675346063e4b95e0370bfbe6c3d77b50c99198180533134aa5644c6b3d45bbb940e9f9a30b55dff43aaceb1f0ea715ce02cf537f047b43f7d6f92dcc30746aaf2aac28b1fa86eace221d8828a4391b2a2418ee9dbdb9d3f8cb318285bafebabdfe4510b639bcef2379a979eb6552345b5efa36d2b765c345dba08edb0a5375a588bf73bb8b15631d73b2708f14bfc5b4b45c389376ba26f0da9d3bb6cc3f9640f0672e94edbd68bbe5777f895fdd66837dc17fb1e099269ca6acdf2aa9ed27d9ce318f945fd06a276bb020396cdb15be0db", 0xe1}, {&(0x7f0000002e00)="c97f0dc6d99d52b6bd18bea884ce5f8070572a9adb3d150fa5c651711756185d8c5cc48a334a8693160147cf45a2e0f8915067bed8677e2da4a4e1031102543f977ed8fa2a81183635d122d93e4b1fb842341fa41a5de728e62dbe8b4893e000e7d2806d165120c68c7685c237beeb82a320c6b6cb33715ef7cc48ff08500dfe17e7619b2e75f579f2d93c8c179cfb1b59cb4f4923d3bfe6341cbaa388650eda064ccdd270edbe8914ba09bedb1a54b36e7f82d4d8936dd237", 0xb9}], 0x2, &(0x7f0000002f00)=[@assoc={0x18, 0x117, 0x4, 0xffff}, @assoc={0x18, 0x117, 0x4, 0xfffeffff}, @op={0x18}, @iv={0xb0, 0x117, 0x2, 0x99, "fd9d9707caee1f7bc52d2766d04119c9da897b67bc72ad75399cb8ca3ec39d46a8f56e72ad50f787d3c111874e3b3ee7912bce4fd8d836cac6f3f1c48e83d95606fe9b7dbdf060a37db0f436f57009d6ab311b156397f23d3521da00789c50da676e5c53381cec1969abee63d91ed46665ff4854693fb768f055b261748616805b0df7af5f271070af0490eff311fbfe7630d8aa1b2a419567"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x128, 0x1}, {0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000003040)="981d4e4c8d75a68eea869341f0b0c9432295c337058f78a122dda9fb709b35b3120a9c68adfcf166b5577418e2a983f632f9c66ed5ae6b96138a984ed3cd069f2cfe72baedaa4d15c6f2b6b69afe5f17388b029e345164712732bde0b86365dd09e4409af7fb01b1e21f17e4aa4f12cafcca39a46c1523b833bf9bd43482108a7d293030f2e700daba0741b65470aaf09a4312cbfbc82e232ab01339002a194d1cf8090a06", 0xa5}, {&(0x7f0000003100)="6007f20b9989fc81a53361dfc14b226803df211b9b9743df2a6b2af394dd59f85fae6d78e6b9f57e64105f4b3b95d9b346e74fe27c", 0x35}, {&(0x7f0000003140)="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", 0x1000}, {&(0x7f0000004140)="12fa19cf0deb28545a3d1894ae3bc8a9d401ae5274e5d38c3d981ac9c76ce79465f8707c49b11963223713f2954c886155c8f6f0d04163dbcd605b885ad8a52389f79fbb9512f5bfa13f95ca21d0e10994feed79668132a4a03f6bc17470df78797734f4bf7ddb5d663473b9791fc807b4c651568bf428be43cd7abea592a74e537237dac059777d523efb504f93c70b4b3e66a333d1776cff7e103c3fdc1739dfe81f19b44b168ad9fc9a17af5c07284afcab1e6d5085469170339edcb8c128c0ffe1e1f8c86d6f7b57d3c9b62659e6a91e3f8a5deb88a77662c147", 0xdc}, {&(0x7f0000004240)="e8e111df06718807825d50afbd878f3e78f51bc06a7766b7375ee490695516be36d72ab31c0edc0fd0e4bfe3ee0a0438fae90bf3627f5c6e7107062049507cc03f316ccdd7e9e24417cde1464becd30eec904664cd408316b30991d6c39835d6cbc167abb708ff67c34bbf0cc587d89d2e2e62849fe4e477e2cb91d3145678c79fa70e39195329a9de530f488c8bc1848198372d4a203aa1f11f15bad295f5316bfb37956151c4416ce5e4d2e3217d07898cd91f7933778024164b399e", 0xbd}, {&(0x7f0000004300)="24e123aad2ed", 0x6}], 0x6, 0x0, 0x0, 0x40000}], 0x4, 0x4040) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) 11:27:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 11:27:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) r3 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x208200) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000200)={0x2, "33d65461dd27199126774564b19a062cd7945db5308888657e29f43f136d8723", 0x3}) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f00000000c0)={0x7, "2a9dce188ee6d66c8e59a969c5559ec7464cfe45efb35a05297de58fef105e04", 0x2, 0x1}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r7, 0x8983, &(0x7f0000000240)={0x1, 'wg1\x00', {}, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$CAPI_GET_MANUFACTURER(r6, 0xc0044306, &(0x7f0000000140)=0x2) [ 1112.307184][ T7041] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1112.480824][ T29] audit: type=1804 audit(1594898858.956:3332): pid=7049 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/869/file0/bus" dev="loop5" ino=1073 res=1 11:27:39 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x0, 0x0, 'ovf\x00', 0x12}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x82) sendfile(r2, r1, 0x0, 0xa198) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x4200, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x8400fffffffb) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xa, 0x0, &(0x7f0000000180)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000480)={0x2c, 0x0, 0x8, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x2c}}, 0x40c0041) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xd5d473c106559333}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 11:27:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 11:27:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0xe4, 0x1, 0x2, 0x401, 0x0, 0x0, {0xc, 0x0, 0x6}, [@CTA_EXPECT_TUPLE={0x9c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private0={0xfc, 0x0, [], 0x1}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x954}, @CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x1f}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASK={0xc, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0xe4}}, 0x81) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x79c568d2db4bba31, 0x0) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000085}, 0xc084) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x18, r7, 0x12fc8ad0283830c7, 0x0, 0x0, {0xa}, [@TIPC_NLA_LINK={0x4}]}, 0x18}, 0x1, 0xf618000000000000}, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r4, &(0x7f0000000900)={&(0x7f0000000340), 0xc, &(0x7f00000008c0)={&(0x7f00000004c0)={0x3e0, r7, 0x20, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x88}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x43d}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x127}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x128, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "bf1094c019cbe8e1670fbb596fa7c340ea63a5a8d9cefcdc96788430f063ea84e9130d9e"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "9ee40d8d8fd55c5d2833c55dd299c39c9091500b"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2973}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "399aecfca0adea580dbe5ffdcfc316dff32b69b1624a2362"}}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "cb7bcdd074a9d8afaa91cf7263c16c25bd745c8b9b77c34d10"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x41}, 0xfffffffa}}}}]}, @TIPC_NLA_LINK={0xa0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc07}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x803}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0xa0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "9a592d7ebe5934d72172e7e5f7fc37833f10408b316033614cac91834d46952c"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb3c}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "ded8d930e1d127a157eb8f5623634a9733eab75e1df9eea89283"}}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x58, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf6b3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x3e0}, 0x1, 0x0, 0x0, 0x20000040}, 0x40811) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, 0x0, 0x0) 11:27:39 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x7, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) [ 1112.588347][T31745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 11:27:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000200)={0x0, 0x0, @ioapic}) pkey_alloc(0x0, 0x1) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r4=>0xffffffffffffffff}, 0x106}}, 0x20) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, <r6=>0xffffffffffffffff}) read$snapshot(r6, &(0x7f0000000480)=""/74, 0x4a) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$ax25_int(r5, 0x101, 0x9, &(0x7f0000000040), &(0x7f0000000140)=0x4) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 11:27:39 executing program 4: syz_emit_ethernet(0x1ce, &(0x7f0000000240)={@random="8b474fc30be2", @random="9568fe0bd0f8", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "dcc400", 0x198, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "011700", 0x0, 0x11, 0x0, @empty, @private1, [@fragment, @hopopts={0x0, 0x2b, [], [@hao={0xc9, 0x10, @ipv4={[], [], @private}}, @generic={0x0, 0xbb, "8e0a0abe16901e9c444f645d1e8a947ccfdb9390380f1ad5e508a8610a247484a12faf7f499da288a0523320e8fd28173777363f4c1f14ac38a282a75a738f2fe0b67db7ce5cb24bc250a5444b4d818aac29c17858a9e137000fd50dde3fdbc1f76d81fdb3d19063a73b366c399a05624636e1693b020690d996044e6f3fa05761819658f4041ce0adcb7a173c50c7175e0ca860a16dadb2a355563e197d530caba88e4dbd95f61ad758cfd1cbcc1145a4fec204f208aedc3b36a2"}, @generic={0x0, 0x6d, "7730cc915c6e4001e9434b43bbd640cd28dd254e6c55da0f1c076433542bfd61a66ab50584af9f636042434ea48d8afa5b909ae7b7a76c08605aff2bda3de928be5be2db1813709c0f746c8a0e2b047978549232811604ac2df61170a92baafcafe2b155d85da523def1ad5866"}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}]}]}}}}}}}, 0x0) 11:27:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) 11:27:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, 0x8, 0x7fff, 0x4, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r3 = socket$pppoe(0x18, 0x1, 0x0) connect(r3, &(0x7f0000000240)=@ethernet={0x6, @random="74306a9de5ac"}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) 11:27:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x45c) [ 1112.839455][ T7079] FAT-fs (loop5): bogus number of FAT sectors [ 1112.870508][ T7079] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1112.873981][ T7085] general protection fault, probably for non-canonical address 0xfbd5a5d5a0000004: 0000 [#1] PREEMPT SMP KASAN [ 1112.889007][ T7085] KASAN: maybe wild-memory-access in range [0xdead4ead00000020-0xdead4ead00000027] [ 1112.898296][ T7085] CPU: 1 PID: 7085 Comm: syz-executor.4 Not tainted 5.8.0-rc5-next-20200715-syzkaller #0 [ 1112.908104][ T7085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.918680][ T7085] RIP: 0010:__xfrm6_tunnel_spi_lookup+0x22b/0x3b0 [ 1112.927281][ T7085] Code: 89 e0 48 c1 e8 03 80 3c 28 00 0f 85 5b 01 00 00 4d 8b 24 24 4d 85 e4 74 53 e8 b1 43 7b fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 2d 01 00 00 4d 8b 7c 24 20 49 8d 7c 24 28 48 89 [ 1112.947958][ T7085] RSP: 0018:ffffc9001776f5c8 EFLAGS: 00010a02 [ 1112.954529][ T7085] RAX: 1bd5a9d5a0000004 RBX: 0000000000000023 RCX: ffffc90011cb5000 [ 1112.963330][ T7085] RDX: 0000000000040000 RSI: ffffffff86f8eebf RDI: dead4ead00000020 [ 1112.971319][ T7085] RBP: dffffc0000000000 R08: 0000000000000001 R09: ffff88804b59aa50 [ 1112.979324][ T7085] R10: fffffbfff1571b09 R11: 0000000000000000 R12: dead4ead00000000 [ 1112.987301][ T7085] R13: 0200000000000000 R14: 0000000000000120 R15: dffffc0000000000 [ 1112.995285][ T7085] FS: 00007f9304e84700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1113.004574][ T7085] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1113.011163][ T7085] CR2: 00007f56d0581db8 CR3: 000000009500c000 CR4: 00000000001526e0 [ 1113.019142][ T7085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1113.027120][ T7085] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1113.035096][ T7085] Call Trace: [ 1113.038401][ T7085] xfrm6_tunnel_spi_lookup+0x8a/0x1d0 [ 1113.043884][ T7085] xfrmi6_rcv_tunnel+0xb9/0x100 [ 1113.048747][ T7085] tunnel46_rcv+0xef/0x2b0 [ 1113.053171][ T7085] ip6_protocol_deliver_rcu+0x2e8/0x1670 [ 1113.058839][ T7085] ip6_input_finish+0x7f/0x160 [ 1113.063926][ T7085] ip6_input+0x9c/0xd0 [ 1113.068005][ T7085] ip6_mc_input+0x411/0xea0 [ 1113.072539][ T7085] ? ip6_input+0xd0/0xd0 [ 1113.076810][ T7085] ? lock_is_held_type+0xb0/0xe0 [ 1113.081927][ T7085] ipv6_rcv+0x28e/0x3c0 [ 1113.086094][ T7085] ? ip6_rcv_core+0x1bb0/0x1bb0 [ 1113.091027][ T7085] __netif_receive_skb_one_core+0x114/0x180 [ 1113.096938][ T7085] ? __netif_receive_skb_core+0x3690/0x3690 [ 1113.102846][ T7085] ? lockdep_hardirqs_on+0x6a/0xe0 [ 1113.107987][ T7085] ? read_seqcount_begin.constprop.0+0x139/0x1f0 [ 1113.114326][ T7085] ? ktime_get_with_offset+0x130/0x1a0 [ 1113.119805][ T7085] __netif_receive_skb+0x27/0x1c0 [ 1113.125140][ T7085] netif_receive_skb+0x159/0x990 [ 1113.130183][ T7085] ? __netif_receive_skb+0x1c0/0x1c0 [ 1113.135513][ T7085] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 1113.141502][ T7085] ? skb_set_owner_w+0x24e/0x400 [ 1113.146449][ T7085] ? __tun_build_skb+0x1cd/0x260 [ 1113.151399][ T7085] tun_rx_batched.isra.0+0x460/0x720 [ 1113.156684][ T7085] ? tun_get_user+0x197f/0x35b0 [ 1113.161538][ T7085] ? tun_sock_write_space+0x1d0/0x1d0 [ 1113.167533][ T7085] ? lock_release+0x8d0/0x8d0 [ 1113.172219][ T7085] ? lock_downgrade+0x820/0x820 [ 1113.177209][ T7085] ? eth_type_trans+0x360/0x690 [ 1113.182078][ T7085] ? __local_bh_enable_ip+0x159/0x250 [ 1113.187459][ T7085] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1113.193447][ T7085] ? tun_get_user+0x231f/0x35b0 [ 1113.198306][ T7085] ? trace_hardirqs_on+0x5f/0x220 [ 1113.203340][ T7085] tun_get_user+0x23b2/0x35b0 [ 1113.208031][ T7085] ? lock_acquire+0x1f1/0xad0 [ 1113.212715][ T7085] ? tun_build_skb+0xf30/0xf30 [ 1113.217488][ T7085] ? tun_get+0x160/0x280 [ 1113.221740][ T7085] ? aa_file_perm+0x5e2/0x1100 [ 1113.226517][ T7085] tun_chr_write_iter+0xba/0x151 [ 1113.231464][ T7085] new_sync_write+0x422/0x650 [ 1113.236195][ T7085] ? new_sync_read+0x6e0/0x6e0 [ 1113.240969][ T7085] ? lock_downgrade+0x820/0x820 [ 1113.245840][ T7085] ? apparmor_file_permission+0x26e/0x4e0 [ 1113.251574][ T7085] vfs_write+0x59d/0x6b0 [ 1113.255839][ T7085] ksys_write+0x12d/0x250 [ 1113.260265][ T7085] ? __ia32_sys_read+0xb0/0xb0 [ 1113.265041][ T7085] ? lock_is_held_type+0xb0/0xe0 [ 1113.269985][ T7085] ? do_syscall_64+0x1c/0xe0 [ 1113.274585][ T7085] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 1113.280674][ T7085] do_syscall_64+0x60/0xe0 [ 1113.285126][ T7085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1113.291022][ T7085] RIP: 0033:0x416661 [ 1113.294995][ T7085] Code: Bad RIP value. [ 1113.299056][ T7085] RSP: 002b:00007f9304e83c60 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1113.307475][ T7085] RAX: ffffffffffffffda RBX: 000000000050b3c0 RCX: 0000000000416661 [ 1113.315450][ T7085] RDX: 00000000000001ce RSI: 0000000020000240 RDI: 00000000000000f0 [ 1113.323436][ T7085] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1113.331429][ T7085] R10: 00007f9304e849d0 R11: 0000000000000293 R12: 00000000ffffffff [ 1113.339404][ T7085] R13: 0000000000000c4a R14: 00000000004ce8f4 R15: 00007f9304e846d4 [ 1113.347383][ T7085] Modules linked in: [ 1113.351461][ T7085] ---[ end trace aaaac076c30fe0a3 ]--- [ 1113.356969][ T7085] RIP: 0010:__xfrm6_tunnel_spi_lookup+0x22b/0x3b0 [ 1113.363446][ T7085] Code: 89 e0 48 c1 e8 03 80 3c 28 00 0f 85 5b 01 00 00 4d 8b 24 24 4d 85 e4 74 53 e8 b1 43 7b fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <80> 3c 28 00 0f 85 2d 01 00 00 4d 8b 7c 24 20 49 8d 7c 24 28 48 89 11:27:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x4], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x45c) [ 1113.369852][ T29] audit: type=1804 audit(1594898859.346:3333): pid=7094 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir761093898/syzkaller.Te4mHZ/870/bus" dev="sda1" ino=16342 res=1 [ 1113.383217][ T7085] RSP: 0018:ffffc9001776f5c8 EFLAGS: 00010a02 [ 1113.412295][ T7085] RAX: 1bd5a9d5a0000004 RBX: 0000000000000023 RCX: ffffc90011cb5000 [ 1113.420345][ T7085] RDX: 0000000000040000 RSI: ffffffff86f8eebf RDI: dead4ead00000020 [ 1113.428361][ T7085] RBP: dffffc0000000000 R08: 0000000000000001 R09: ffff88804b59aa50 11:27:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8}, 0x10) [ 1113.436410][ T7085] R10: fffffbfff1571b09 R11: 0000000000000000 R12: dead4ead00000000 [ 1113.444466][ T7085] R13: 0200000000000000 R14: 0000000000000120 R15: dffffc0000000000 [ 1113.452503][ T7085] FS: 00007f9304e84700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1113.461504][ T7085] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1113.468094][ T7085] CR2: 00007f56d0581db8 CR3: 000000009500c000 CR4: 00000000001526e0 [ 1113.476135][ T7085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1113.484186][ T7085] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1113.492246][ T7085] Kernel panic - not syncing: Fatal exception in interrupt [ 1113.500896][ T7085] Kernel Offset: disabled [ 1113.505220][ T7085] Rebooting in 86400 seconds..