0000000800030001000000"], 0xd4}, 0x1, 0x0, 0x0, 0xc010}, 0x20000800) getsockopt$inet_int(r1, 0x10d, 0xf, &(0x7f0000000280), &(0x7f0000000100)=0x4) [ 531.996029] IPVS: length: 193 != 8 15:29:39 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty, 0x4}, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x200006) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) recvmmsg(r3, &(0x7f0000001cc0), 0x400000000000160, 0x10102, &(0x7f0000001540)={r4}) ioctl(r2, 0x6, &(0x7f00000008c0)="c9b0f78c9f3dedcba97b1d40651c51ab16a82003e02e40191764d1f603de40ca3343ea43976c705b4b466cef49ce31cd889e07c7c2c97afe6f2988a4a0963437ccd64efbee3fefe448b8793ad0af1a54ac2c4ffd3853756a64c435ab52d9cdcb72bb6efc412388ae658e147db729b8eecaa7a73ba93faac996d75d3ae7189d06160b8e9e0d8a72eb4e002ea507a0efdb6cd8fb8f5ee675e88edaedf87052d34b5c819f3a748e9dcf2ddaab5b0d8de16eed2910ca92") llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) getsockname$packet(r3, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x11a) sendto$packet(r3, &(0x7f0000000a80)="2a11f1b5bd5a7b46ea129772e358a020f8ddb29fbd596167713878030a3f46ac45f2cbd24b4c0306fbf7397578535d5c", 0x30, 0xc5, &(0x7f0000000b40)={0x11, 0xa, r5, 0x1, 0xf5e3, 0x6, @broadcast}, 0x14) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x10400, 0x0) rename(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='./file0\x00') getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) ioctl$TUNSETOWNER(r6, 0x400454cc, r7) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000140)=[@in={0x2, 0x4e22, @rand_addr=0x1ff}, @in6={0xa, 0x4e23, 0x4, @loopback, 0x100000000}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @multicast2}, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r8, @in6={{0xa, 0x4e24, 0x1000, @mcast1, 0x2cbb23a}}, 0x0, 0x3d6f, 0x8000, 0x2, 0x4}, &(0x7f0000000340)=0x98) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000640)=0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000680)={0x1, r9}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/mixer\x00', 0x0, 0x0) r10 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r10, 0x8922, &(0x7f0000000100)={'bond0\x00', 0x7f}) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r10, &(0x7f0000000a40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x28c4}, 0xc, &(0x7f0000000a00)={&(0x7f0000000440)=ANY=[@ANYBLOB="d400000006db3ca6b1500f7c27b4804b01ec5d5330a601fd7020a92439bfa3ac038158c0660d142519080000b05ed4d93a8744e4647d2eee815bbc609c9398a2e1f7172f22329fbe8cff3f5dd7c78b3c5419ee", @ANYRES16=r11, @ANYBLOB="040c2bbd7000fedbdf25090000000c00010008000200b70000002800030008000500ac14141208000500ac14141d14000200697064647030000000000000000000000c000300080007004e23000008000500000800000800060005000000080004000500000024000100080008000100008008000200000000000800010002000000080001000a0000000c000100080005000100000038000300080007004e200000080007004e200000080004005a00000014000200626f6e645f736c6176655f30000000000800030001000000"], 0xd4}, 0x1, 0x0, 0x0, 0xc010}, 0x20000800) getsockopt$inet_int(r1, 0x10d, 0xf, &(0x7f0000000280), &(0x7f0000000100)=0x4) 15:29:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000035c0)='/dev/vhci\x00', 0x80000, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1d, &(0x7f0000003600), &(0x7f0000003640)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x1, 0x1, 0x3, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$binfmt_elf64(r3, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x1478) 15:29:39 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x4000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:39 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x6f01000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:39 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1f, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000002b80)={0x8, 0x7, 0x3, 0x7fff, 'syz0\x00', 0x100}) io_setup(0x7, &(0x7f00000001c0)=0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000002500)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002540)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000002640)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002680)={0x0, 0x0, 0x0}, &(0x7f00000026c0)=0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002bc0)={'irlan0\x00', 0x100}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002740)={0xffffffffffffffff, r2, 0x0, 0xffffffffffffff97, &(0x7f0000002700)='/dev/snd/controlC#\x00'}, 0x30f) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002780)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000002880)=0xe8) getgroups(0x3, &(0x7f00000028c0)=[0xee01, 0xee00, 0xffffffffffffffff]) r9 = getpgrp(0x0) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000029c0)=[0xee00, 0x0]) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000002b00)={0x1, 0xd77}, 0x2) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002a00)=0xffffffffffffffff, 0x4) r13 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000002a40)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002a80)={0x0, 0x0}, &(0x7f0000002ac0)=0xc) r16 = socket(0x1e, 0x2, 0x0) bind(r16, &(0x7f0000000140)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r16, &(0x7f0000670000)=@generic={0x1e, "02fd000000000000000100000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) r17 = getegid() sendmmsg$unix(r2, &(0x7f0000002c80)=[{&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000024c0)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="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", 0x1000}], 0x2, &(0x7f0000002e00)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000020000000000e1ff2000010000000100000043006a0821e11942b4eda5b583929e3177e8ff7a56889848fdbc6b5a8d5d92b63d242759b97c1503f692496fdea62478280cab569e45f67d8eb39904cfdc99c0fcb4dee51659ab3f04b644e6fdd6600e81dfa82f110d6d04dbd42da30e236a7d6310d0395f89fbe5ed3e5083e09e92980157bf4e0ac6c77c9b0f72738d8e08213eed522cb88d01afac9eb1147693b558c40782296f805dabfc27e05f1110ef77078f3c5af1671a9ec685b29230a35240e7f76bd9fffa72f716a3036c", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r13, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r17, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x158}], 0x1, 0x1) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x6, 0x8001, r0, &(0x7f0000000200)="9d672993d476100d9fcfe56df34a6e577790ccfb8ec3879ad074d6756b9970f26a2d9fbfedcc0ffa57fb0b57a086b1e269498fd350ef73d64a", 0x39, 0x200000000000000, 0x0, 0x3, r2}, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000240)={{0xa, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', &(0x7f00000000c0)}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002b40)=0xe8) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000180)={0x0, 0x3, 0x10001, 0x2, 'syz0\x00', 0x7}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000080)=""/240) 15:29:39 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x68051, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 532.432879] IPVS: length: 193 != 8 15:29:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x6, 0xb404, 0xffffffffffffffff}) [ 532.474092] FAT-fs (loop1): bogus number of reserved sectors [ 532.506689] FAT-fs (loop1): Can't find a valid FAT filesystem [ 532.520244] IPVS: length: 193 != 8 15:29:40 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x4000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1000, 0x10000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x0, 0x7fffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) write$cgroup_int(r2, &(0x7f0000000380), 0x10076) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000100)={0x6, 0x4, 0x4f30, 'queue0\x00', 0x5}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x0, r1}) 15:29:40 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000810092910700c9fa0000"], &(0x7f0000000240)=0xe) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x2) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r1, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000080)={0x0, 0xc4fe, {0x54, 0x7, 0x400, {0x4, 0x4}, {0x3f, 0x3}, @cond=[{0x6, 0x6, 0xdf02, 0x1, 0x6, 0xbae}, {0x2, 0x100000000, 0x1, 0x98, 0x3}]}, {0x53, 0xffffffff, 0x3, {0x4, 0x9984}, {0x401, 0x80}, @rumble={0x500000000000000, 0x3}}}) close(r2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x1f, @local, 0x5}, @in={0x2, 0x4e20, @multicast1}], 0x2c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x73, 0x3}, &(0x7f00000002c0)=0x8) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r5 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) bind$alg(r5, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r6 = accept$alg(r5, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000007900)={&(0x7f00000056c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000078c0)={&(0x7f0000007800)=ANY=[@ANYBLOB="ff010000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={r3, 0x3}, 0x8) sendmmsg$alg(r6, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000300)={r3, 0xffffffffffffff78}, 0x8) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000100)={0x2010}) [ 532.730721] IPVS: length: 193 != 8 15:29:40 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x8b070000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 532.772131] IPVS: length: 193 != 8 15:29:40 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20080, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x90, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e23, 0x8, @mcast2, 0x1}, @in6={0xa, 0x4e21, 0xf, @remote, 0x5}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [], @multicast2}, 0x1000}, @in6={0xa, 0x4e23, 0x2825, @loopback, 0x20}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={r1, 0x2, "e7cf"}, &(0x7f0000000280)=0xa) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) [ 532.876322] FAT-fs (loop1): bogus number of reserved sectors [ 532.884340] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:40 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) lseek(r1, 0x400, 0x0) futimesat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{}, {0x77359400}}) getdents(r1, &(0x7f0000000040)=""/148, 0xab) 15:29:40 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x800000000000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:40 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='rdma.max\x00', 0x2, 0x0) r3 = dup2(r2, r2) write$FUSE_ATTR(r3, &(0x7f00000001c0)={0x78, 0x0, 0x2, {0x4, 0x0, 0x0, {0x3, 0x0, 0x0, 0x400000000000, 0x222, 0x4, 0x0, 0x0, 0x1ff, 0x6c, 0x0, 0x0, 0x0, 0x3, 0x100000001}}}, 0x78) 15:29:40 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)="153f620a9b") r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$TIOCCONS(r0, 0x541d) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xff4c) close(r0) [ 533.119041] IPVS: length: 193 != 8 15:29:40 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x7050000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:40 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000008880)='/dev/audio\x00', 0x0, 0x0) close(r1) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001980)=""/150, 0x96}], 0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) write$vnet(r0, &(0x7f0000000480)={0x1, {&(0x7f0000000380)=""/12, 0xc, &(0x7f00000003c0)=""/176, 0x0, 0x2}, [0x0, 0x0, 0x8003002000000000]}, 0x68) 15:29:40 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) fcntl$getown(r0, 0x9) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x4, 0x1, {0xa, 0x4e20, 0x3}}}, {&(0x7f0000000040)=""/249, 0xf9}, &(0x7f0000000140), 0x8}, 0xa0) [ 533.179756] IPVS: length: 193 != 8 15:29:40 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x28010, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="706964732e63757289656e7461cbbfac8d9c0204005ebac48c53ee7d96dd85baac4b6d75f4f43a01b7ecaae5b6c9706c05e62f7f9ecff2bcee9d28da1289240bdedcb8e2cc2fdf0da2c8b41521c0087e7e7c7ca8bf9b36cc8bfa477695824eb9f4ebc5b55ac0898e1bac076ea18943ff4f637e855e2d94130840b197ee5e875f38148c209ec335fecd0be6", 0x2761, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @loopback}}, 0x1e) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc, 0x8001}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @remote}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'ifb0\x00', r3}) 15:29:40 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x400000000000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x123000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_ONE_REG(r0, 0x40046104, &(0x7f0000000140)) [ 533.276824] FAT-fs (loop1): bogus number of reserved sectors [ 533.286509] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) r3 = getpgid(0xffffffffffffffff) capset(&(0x7f0000000080)={0x20071026, r3}, &(0x7f00000000c0)={0xfffffffffffffffa, 0xd0, 0x3f, 0x1, 0x40, 0x6}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [{0x1dd, 0x0, 0x8e84}, {0x3ff, 0x0, 0x5}]}) r5 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r5, 0x401104000000016) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 533.426002] IPVS: length: 193 != 8 15:29:40 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x200141042, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7f, 0x100) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 533.484187] IPVS: length: 193 != 8 15:29:41 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) readv(r0, &(0x7f0000002000)=[{&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/250, 0xfa}, {&(0x7f0000001b00)=""/147, 0x93}, {&(0x7f0000001bc0)=""/153, 0x99}, {&(0x7f0000001c80)=""/19, 0x13}, {&(0x7f0000001cc0)=""/186, 0xba}, {&(0x7f0000001d80)=""/248, 0xf8}, {&(0x7f0000001e80)=""/89, 0x59}, {&(0x7f0000001f00)=""/34, 0x22}, {&(0x7f0000001f40)=""/186, 0xba}], 0xa) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) recvmmsg(r0, &(0x7f0000000980)=[{{&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/54, 0x36}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/245, 0xf5}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f0000000580)=""/182, 0xb6}, {&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000000640)=""/194, 0xc2}, {&(0x7f0000000740)=""/88, 0x58}, {&(0x7f0000000140)=""/9, 0x9}], 0xa, &(0x7f0000000880)=""/216, 0xd8, 0x8}, 0x7}], 0x1, 0x2063, &(0x7f00000009c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000020c0)) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:29:41 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xda7, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) ptrace$setopts(0x4202, r1, 0x0, 0xa06ffc) 15:29:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x3, 0x1ff, 0x0, 0x8000}, 0xfff, 0x9, 'id1\x00', 'timer0\x00', 0x0, 0xffff, 0x200, 0x3, 0x9}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x3ff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0xffff}, 0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r2) 15:29:41 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x4000000000000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 533.686992] FAT-fs (loop1): bogus number of reserved sectors [ 533.693303] FAT-fs (loop1): Can't find a valid FAT filesystem [ 533.796079] IPVS: length: 193 != 8 [ 533.837401] IPVS: length: 193 != 8 15:29:41 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x4000000000000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:41 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x100000001, 0x40100) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140)=0x80000000, 0x4) truncate(&(0x7f00000000c0)='./file1\x00', 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x24, 0x100) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:41 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141046, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000140)={r1, 0x2}) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x80010, r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = getpid() ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/60, 0x3c}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)=0x0) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x10, 0x3, @tid=r4}, &(0x7f00000002c0)) 15:29:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000001c0)={{0x3, 0x3, 0x1ff, 0x0, 0x8000}, 0xfff, 0x9, 'id1\x00', 'timer0\x00', 0x0, 0xffff, 0x200, 0x3, 0x9}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x3ff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0xffff}, 0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r2) 15:29:41 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x40000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:41 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x77060000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 534.241935] FAT-fs (loop1): bogus number of reserved sectors 15:29:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0x8000000000004e20, @loopback}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000100)={0xf, 0x1f, 0x2, 0x6}, 0xf) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7f, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f00000000c0)={0x80000000, 0x401}) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140)={0x8, 0x7f48, 0x1, 0x9, 0x5, 0x80000000800, 0x20, 0xffffffffffffff01, 0x5, 0x1, 0x7}, 0xb) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x401, 0x30}, 0xc) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000100)) r5 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x2, 0x8000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000001c0)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0xc) sendmsg(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="ac", 0x1}], 0x1, &(0x7f0000001440)}, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000580)={&(0x7f0000000340)={0x27, 0x1, 0x2, 0x3, 0x8c, 0x2, "fbfde02fdb2eca0504a155da65dcd144b7f532351d04c226d65ed4a859db34b13411071002c10375e24b85f41208c922474ae9da3606d06ad2d3a748c81590", 0x12}, 0x60, &(0x7f00000002c0)=[{&(0x7f0000000440)="603c659758b8fe5f12d81ed9b8ae4129a7bf67b7a550c3c8fa7deba28637ddfa2de9fae8fa3981ab859bc1b7ea5011997e01b74d2258513e5e14dbbabbfac63c170f1f855c35ec35f087998277c95f90ae76005fcfb950ead2441ffb041011552bbfdc6631eaa1e2a8c7ee3e08abc64943494abfdccc49b41564ebd44353dda6d5ef2cadfd80c328c4b5a07ca10a2a91c76200214f30241fb72a4c585446ed6ce639706b63b950539613cd369c4232c9e86111d6217d", 0xb6}], 0x1, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x108, 0x40811}, 0x40) write$9p(r5, &(0x7f0000000600)="2529507426046f38d2450e0dd21ef46d5a55e404991debcd9ecf284e8a206c3bbf05fe847660620a5936c3483ebcd875c6f68bc41bc4f57fab775116678a711b3f0b5d83f8f5023366719f8c0c66878b8cf3f89dfaaddf9fae0bc3574ad4595d9bee39a524e0b9f499", 0x69) setsockopt$inet_tcp_int(r5, 0x6, 0x3e, &(0x7f0000000300)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0), 0xc) sendmsg$nl_route(r2, &(0x7f0000000540)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB="20000000220020002abd708439171000ffdbdf250a72547b0e"], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x10) write$binfmt_misc(r4, &(0x7f0000000240)={'syz1'}, 0x34000) lsetxattr$trusted_overlay_origin(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f0000000700)='y\x00', 0x2, 0x3) [ 534.293499] IPVS: length: 193 != 8 [ 534.298557] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:41 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2000000, 0x1011, r0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='xino=on,index=on,redhrect_dir=./bus,metacopy=off,\x00']) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r1, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000140)='overlay\x00', 0x8, 0x1) close(r1) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x4, @random="e0a5db613830", 'rose0\x00'}}) [ 534.373735] IPVS: length: 193 != 8 15:29:41 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt_acct\x00') openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8400, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x20100) syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x38bd, 0x30080) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$vnet(r1, &(0x7f0000000480)={0x1, {&(0x7f0000000580)=""/4096, 0x1000, &(0x7f0000000380)=""/205}}, 0x68) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 15:29:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000101007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000005000000"], &(0x7f0000000400)="59797a6b616c6c6572001c3dfffd193bf9ba7fd1408a282555fbae9a2ae220d8602b7fbe655578553f554a06cb30141906f8df9993314fea0115f4bf0400000000000000b7eed778974a0c91bb5c2766e058e12d4ba326c05f1b27b873062067c75e40c19a99367f5c8d0000e1250a6cf95221159d0bbd9675cb3fa889fa313ef833fe2bfd837d0c92d05921f199a838751360"}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$VT_RELDISP(r1, 0x5605) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000600)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000880), 0x0, &(0x7f00000008c0)=""/165, 0xa5}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x14000000, 0x3ff, 0x9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0xe, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cea", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 15:29:41 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x8}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 534.520239] overlayfs: unrecognized mount option "redhrect_dir=./bus" or missing value 15:29:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000100)={0x4, 0x0, [{}, {}, {}, {}]}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:42 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xfb08000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 534.656722] overlayfs: unrecognized mount option "redhrect_dir=./bus" or missing value 15:29:42 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) geteuid() listen(r1, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() gettid() lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {r2, 0x52, "11f15b", "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"}}, 0x110) getresgid(&(0x7f0000000980), &(0x7f0000000a00), &(0x7f0000000a40)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) truncate(&(0x7f0000000400)='./bus\x00', 0x10000) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x0) getpriority(0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000009c0)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) [ 534.708537] IPVS: length: 193 != 8 [ 534.766395] IPVS: length: 193 != 8 [ 534.795414] FAT-fs (loop1): bogus number of reserved sectors [ 534.826000] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:42 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x49011, r0, 0x5c) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:29:42 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfffffffd}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:42 executing program 0: getsockname(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FICLONE(r0, 0x40049409, r1) dup(0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200000, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)="396e12f0736cc474f949e11c1d3f0b170ce5ca753ffac61df77d16163fdf69a6eefb96771c30dcea918b4256ef41f8a6e948704c88225b771c0d92df55e0814d12cb61485d0f53906e13207465fba2997c37a68b681e5c01573676c482dd7593ea05b9e70aea75124dd293ee936fe09d0d347c968833d5500a64b77b6da011d1aba7074282bddf8524229367ea079d27bd7c447dc7ddb9036a7dc653b9e250bc165f8432a2c497c67c519160481152c6bbd3a52d881c24bc28d0fda85db666063937421f9e72cc75704cb0422b57d71f5c0826eab8efede9e25b60332d60663ec71d5d0a5355023259af37ba96ee262960c3c9", 0x2761, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:42 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="2719929e03bfba81bd3a1dc4", 0xc}], 0x0, 0x5a) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r2, r5) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$BINDER_THREAD_EXIT(r7, 0x40046208, 0x0) r8 = getpid() ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000340)={0x0, 0x0, 0x3, 0x5}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000800)={0x4, r9}) listen(r5, 0x0) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000280)="0c98bfbaff3b6a56c49cd1cd1fb3e1a875eeddce789b392ad85c10d50aedb37557b847f78bd501b54ad3d258a3e33e72a4d2f0a26c99c0ad34a2d88e74ae421b3f292162d1807f1941d0b84f171d5d1fbacbace236dca130742c53a6a743f5f0408af443e7f1eaca4c1785579fbc270e", 0x70}, {&(0x7f00000004c0)="cc63a7f9dea5c12b905c4d704e2f885e043facea197527f1d22e7e6c193446dc9d3cbfec76432b7385e32f8f9837c1065eaf8ac1d7f0b4f5442aafec1373572fb76ce082fa5716f88a8a36bff2901849dcd1ea3e92d285f54894fc3b4df8995b5157997e797fbe62330064db3d6d39c233b3786c1df4fbb823ef24b08c06fcf67ca94ed6ba15758e70e55b714946d2351f2074f8d19ba0211ca8a2086821f5113c5f256c4e44198ee77c", 0xaa}, {&(0x7f0000000300)="8b7b33d5ee976851", 0x8}, {&(0x7f0000000580)="efa17110ee69d6893951717a66c0b40b7da7bbb02a73fb32bae2808b7f3dce4fa3f68bb48ab8df5fa2e23d86433aae3b4ef09cb1715bacd0c8da04c0c5dfa03bdfde8919fc3eba3c1935b0a43cb1f4", 0x4f}, {&(0x7f0000000600)="b04d6f94c18d773352b7da07c4120f14befb982af3b8a3042c4faa6473ff9617d9186a8a1fcbab9ca5bab17823d14fe71b608430fa38b76b2437bd24b53066e2f4d6f3d73430196f8cdaca6ae49abbad031bad0de7f4b4cc6bb5fdcde87ae36bb2ccbba506fb1c31c0900f3e8ce67bc69e", 0x71}, {&(0x7f0000000680)="eef6fc507838539ac304ef3897e19580541eca1815566279412a03a39207dd784b5ff3cb31928c8771d553827c78184b424d336d3289ebcf38baafffb05a67c4287f3634b35f45e3d59a19f1da05cd2fcf091ff2fd72e62f9dd27022bd3b1171a9ec927835df01f9ecc3f49beefcc122779a5fdd4c944adf0b7b5a01d2442760387a4864142f9822ef7545cd91ff70b486b2c8ef3665ef10844d7e99af22f2418563fa10f400ec7ce05387bd56d93bc14c558a238445907a1dc217b374f9d335370201873ed62fdeccca7892dc0ca10f253e20a856ef84d5aa0dcf2309036b34810193c0686b7f8b9675f7081d524b356ceb3360b6852b", 0xf7}], 0x6, 0x0) sched_setscheduler(r8, 0x5, &(0x7f0000000200)) setsockopt$inet6_group_source_req(r7, 0x29, 0x1a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r6) inotify_add_watch(r3, &(0x7f0000000240)='./bus\x00', 0x90) 15:29:42 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x930c0000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 535.147445] IPVS: length: 193 != 8 15:29:42 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 535.213875] IPVS: length: 193 != 8 [ 535.305833] FAT-fs (loop1): bogus number of reserved sectors [ 535.354364] FAT-fs (loop1): Can't find a valid FAT filesystem [ 535.362191] kauditd_printk_skb: 24 callbacks suppressed [ 535.362206] audit: type=1804 audit(1539617382.771:718): pid=22093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/344/file0/bus" dev="ramfs" ino=70394 res=1 15:29:42 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfffffffd}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:42 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x2}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 535.454835] audit: type=1804 audit(1539617382.851:719): pid=22089 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/344/file0/bus" dev="ramfs" ino=70394 res=1 15:29:43 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) close(r1) [ 535.595057] audit: type=1804 audit(1539617382.950:720): pid=22100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/344/file0/bus" dev="ramfs" ino=70394 res=1 [ 535.679378] IPVS: length: 193 != 8 [ 535.701072] IPVS: length: 193 != 8 15:29:43 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x2f07, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000240)="c4c37d08c90366ba4300b022eec74424009cf9fb9cc744240206000000c7442406000000000f011c24640f01c9b8010000000f01c1e7e7c4c178288102000000c7442400c3000000c744240200000000c7442406000000000f011424c4c1381220c4c16d668f0f9f0000", 0x6a}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x0, 0x0, 0x400000b7]}) 15:29:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6149f3a523e4898997b5da81fb8fb29b3acecd7d27bb407b659baaba259b82e9cfbad0ceb15ebe1cf436aeb4d4c65a1cf91610fef6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000002000), 0x1000) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open$dir(&(0x7f0000000180)='./file0/file0\x00', 0x189c40, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) socket$alg(0x26, 0x5, 0x0) 15:29:43 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x800, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) socket$nl_xfrm(0x10, 0x3, 0x6) 15:29:43 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) connect(r0, &(0x7f0000000100)=@pptp={0x18, 0x2, {0x2, @local}}, 0x80) rename(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) fgetxattr(r0, &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000200)=""/163, 0xa3) 15:29:43 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x21c}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 535.862969] FAT-fs (loop1): bogus number of reserved sectors [ 535.898179] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:43 executing program 2: mmap(&(0x7f0000c67000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x194) getresgid(&(0x7f0000000fc0), &(0x7f0000000440), &(0x7f0000001040)) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2000000000, 0x100) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = accept(r0, &(0x7f0000000300)=@nfc, &(0x7f0000000380)=0x80) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0xfffffffffffffffc, 0x200000) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x10001, 0x0) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000580)=0x80) r9 = accept(r0, &(0x7f00000005c0)=@nl=@unspec, &(0x7f0000000640)=0x80) r10 = syz_open_dev$dmmidi(&(0x7f0000000680)='/dev/dmmidi#\x00', 0x8, 0x20c000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000006c0)={r0}) mbind(&(0x7f0000c67000/0x1000)=nil, 0x1000, 0x8002, &(0x7f00000000c0)=0xb12c, 0xffff, 0x7) pipe(&(0x7f0000000700)={0xffffffffffffffff}) r13 = syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x410000) r14 = syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x400) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000008c0)={&(0x7f0000000040), 0xc, &(0x7f0000000880)={&(0x7f00000007c0)={0x8c, r2, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r0}, {0x8, 0x1, r6}, {0x8, 0x1, r0}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}]}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x1, r13}, {0x8, 0x1, r14}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0xc1}, 0x80) [ 535.900297] audit: type=1804 audit(1539617383.307:721): pid=22144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/345/file0/bus" dev="ramfs" ino=71503 res=1 [ 535.991599] audit: type=1804 audit(1539617383.386:722): pid=22151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/345/file0/bus" dev="ramfs" ino=71503 res=1 [ 536.013635] IPVS: length: 193 != 8 15:29:43 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) ptrace$pokeuser(0x6, r0, 0x5, 0x28cf) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 15:29:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x20000b3fc}) 15:29:43 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x8, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x4, 0x2, [0x1010000000000, 0x6]}, 0xc) close(r1) [ 536.122314] audit: type=1804 audit(1539617383.476:723): pid=22151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/345/file0/bus" dev="ramfs" ino=71503 res=1 [ 536.158745] IPVS: length: 193 != 8 15:29:43 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x230b, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:43 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x3f00000000000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:43 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x21c}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x100) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000340)={[{@lowerdir={'lowerdir', 0x3d, './file1'}}, {@metacopy_off='metacopy=off'}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) [ 536.296595] FAT-fs (loop1): bogus number of reserved sectors [ 536.334976] FAT-fs (loop1): Can't find a valid FAT filesystem [ 536.347126] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 536.366157] IPVS: length: 193 != 8 [ 536.387820] audit: type=1804 audit(1539617383.783:724): pid=22188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/346/file0/bus" dev="ramfs" ino=71546 res=1 [ 536.410658] IPVS: length: 193 != 8 15:29:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") [ 536.442271] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 536.471573] audit: type=1804 audit(1539617383.872:725): pid=22178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/346/file0/bus" dev="ramfs" ino=71546 res=1 15:29:43 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x7ff, 0x5, 0x8000, 0xcca9, 0x0, 0x800, 0x8, 0x6, 0x5, 0x7, 0x6, 0x9, 0x1e3, 0x1, 0x6df0, 0xca, 0x10001, 0x3, 0x80000001, 0x6, 0x5, 0x100000000, 0x6, 0x3, 0x8, 0xd6f, 0x6, 0x100, 0x8001, 0x7fff, 0x858, 0x7e81, 0x3ff, 0x9, 0x200, 0x6, 0x0, 0xca92, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x20000, 0x5, 0x7, 0x4, 0x9, 0x8, 0x7}, r0, 0x2, r1, 0x6) close(r1) 15:29:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="0000020000000000000000000000000000000000000008000000000000e4000000000000000000000000000000000000000000000100000000000000000000006b427a7e1ee72b7c188959f79f8c076b05db1a745cfe023451c5c24a28aa94979fdc43e9698bd58a7a0d9afdd19f997f2350358ee915d4b45ca42713bb4ebbe89d58e3cf7ca2f33ab3c8026eac20353a44da36f15d013085cc9d499d9ebe9d8c6e383fdc12ba15ef72"], 0x40) recvmmsg(r1, &(0x7f0000007180)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/17, 0x11}], 0x1, &(0x7f0000001400)}}], 0x1, 0x0, &(0x7f0000007400)={0x0, 0x1c9c380}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x1a1000) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000000c0)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000100)) 15:29:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0xffffffffffffffc3) close(r0) [ 536.564555] IPVS: length: 193 != 8 15:29:44 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x1c020000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:44 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x2702000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:44 executing program 3: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1bab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000000)={0x7, 0x7}) 15:29:44 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x200c57) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xfffffffffffffffe, 0x1015, r0, 0x10000000000000) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x3, 0x1000, 0x7, 0x1000, 0x1, 0x81, 0x0, {0x0, @in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @multicast2}, 0xfffffffffffffffb}}, 0x7ff, 0x2, 0x1, 0xb2, 0x8001}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x5}, &(0x7f00000004c0)=0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x7691a0458357db0a, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r3, 0x1}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000500)={r1, 0x6}, &(0x7f0000000540)=0x8) 15:29:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @remote}, &(0x7f0000000100)=0xc) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) fdatasync(r0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000080)) [ 536.806570] FAT-fs (loop1): bogus number of reserved sectors [ 536.812815] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0xa, 0x2, 0x11) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0xd}, 0x80, &(0x7f0000000340), 0x15, &(0x7f0000000180)}, 0x0) 15:29:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80, 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x1400000}, &(0x7f0000000100)=0x8) syz_emit_ethernet(0x46, &(0x7f0000000200)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x2f, 0x0, @dev, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000001780)) [ 536.890245] IPVS: length: 193 != 8 15:29:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffefffffffffff7f) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x8, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000080)=0xb, 0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) ioctl$NBD_CLEAR_QUE(r0, 0xab05) write$binfmt_misc(r2, &(0x7f0000000240)={'syz1'}, 0x40cc) [ 537.014015] IPVS: length: 193 != 8 15:29:44 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0x3f000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:44 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x33b, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:44 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141044, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1c, 0x204000) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:29:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x104) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:file0,workdir=.']) r0 = syz_open_pts(0xffffffffffffffff, 0x2001) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) keyctl$session_to_parent(0x12) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x88202, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000240)={0x2, 0xbfe, 0x2, 0x5, 0x93, 0x100000000, 0x3, 0x5, 0x4}) readlinkat(r1, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000540)=""/184, 0xb8) socket$inet(0x2, 0xa, 0x3) geteuid() getegid() writev(r1, &(0x7f0000000500)=[{&(0x7f0000000300)="d7fe47ba2ad1c6f76377b7498a309d09cd96fd73e0e11e234897633eae04fd1309d9b3f11a3daf9726d6a9b30050064317cc7e5dfda3bb9821eb6975c38e614f9d40309369eb787582a8ae1a8169d66d3d5dcea0eae52c263d7d737573cf94c56e6d8dd90313b8a0c26856e8a14c941ef5626fa2ffcfbe67dfe3307f8bc6098b63a091bd65280027f5ae4a58570a7cb6559a99d81b5d3415136464476b8f78ebd8f5b72b534dd4e8443c888b63b0bcd7ed38d66ebd92ec82b1e090", 0xbb}, {&(0x7f00000003c0)="9d785f91e325eb2008e3122e1c2517d3cb6781ef9d9ea217dc91f471a7b272ea7b728fd4a0db77c0a146c0fe7b3c7073c309d404597231878a9cbd372abbb9863420d6f1601e44a5b0eafb54f5e1cd667d0f288c7ec46eefd0bcd895695ea916738e0ef24838f0752a5086042b7a3a72073b7f4b53321001682cb0b02fa1528d587148f2e7f3bafba5efeae6aeb39e6e22f9ef798319fdf5c103ef9042abeb200256918d925d8a00b9e183e1a58731c18b7d63c7515c55a506f3", 0xba}, {&(0x7f0000000480)="c595c281ce62cf9960ff01ff43347d2dce1d496395f99ce06ecf1f3def9a966bbfbe59dc61f816c592313be472b3fdd8322e507931953edc8ae88c3410d17acd718602461fcc36dcfff157e67b51c40c14e38b5831d196f6697de5d51aa707246d6d94b462ecb243fbe5", 0x6a}, {&(0x7f00000000c0)="031232b09aed96925deb602a4f6a31640bb9", 0x12}], 0x4) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6, 0x113000) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x5, 0x4, 0x1, 0xffffffffffffff9c}) [ 537.222086] IPVS: length: 193 != 8 15:29:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = dup(0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000100)) r1 = creat(&(0x7f0000000480)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000200)=""/229) chdir(&(0x7f00000000c0)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000c80)={0x0, 0x0, 0x1, 'queue0\x00'}) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x0, 0x3}) statfs(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)=""/142) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000d40)={0x0, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300)={r2, 0x0, 0x30}, 0xc) 15:29:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000200)=0x40, 0x4) write$input_event(r0, &(0x7f0000000140)={{}, 0x12, 0x9, 0x9}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000000c0)={0x1, 0x9, 0x7, {r1, r2+10000000}, 0x3, 0x2}) times(&(0x7f00000001c0)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) [ 537.295768] FAT-fs (loop1): bogus number of reserved sectors [ 537.305156] IPVS: length: 193 != 8 [ 537.311532] FAT-fs (loop1): Can't find a valid FAT filesystem [ 537.344608] QAT: Invalid ioctl [ 537.371989] QAT: Invalid ioctl 15:29:44 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfd00000000000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @remote}, &(0x7f0000000100)=0xc) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) fdatasync(r0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000080)) 15:29:44 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xff60}, 0xe3c7) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) sched_setattr(0x0, &(0x7f00000003c0)={0x0, 0x1, 0x0, 0x0, 0x5, 0x4}, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x900000e, r1}) 15:29:44 executing program 0: r0 = eventfd(0x100000001) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7, 0x0, 0x1, 0x75, 0x7fff, 0x490}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000080)=""/210, 0xd2}, {&(0x7f00000001c0)=""/19, 0x13}], 0x2, 0x0) [ 537.569681] IPVS: length: 193 != 8 15:29:45 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xffffffffffffffff, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="0001", 0x2, 0xfffffffffffffffd) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101000, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000040)={r2, r2, r3}, &(0x7f0000000440)=""/240, 0xf0, 0x0) fchdir(r1) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) fcntl$setstatus(r0, 0x4, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x740, 0x0) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000140)={0x0, 0x1}) sendfile(r4, r4, &(0x7f00000000c0), 0x8080fffffffe) 15:29:45 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) listen(r0, 0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x7fff, 0x7}, &(0x7f0000000100)=0x8) [ 537.717525] IPVS: length: 193 != 8 [ 537.895944] FAT-fs (loop1): bogus number of reserved sectors 15:29:45 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfdffffff}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 537.956100] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:45 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8, 0x868433b70c21af69) r1 = eventfd(0xff) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) prctl$void(0x27) 15:29:45 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x90100, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) [ 538.239155] IPVS: length: 193 != 8 15:29:45 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000002340)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/57, 0x39}, {&(0x7f0000000200)=""/142, 0x8e}, {&(0x7f00000002c0)=""/165, 0xa5}], 0x3, &(0x7f0000000380)=""/182, 0xb6, 0x6}, 0x7}, {{&(0x7f0000000440)=@un=@abs, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/51, 0x33}, {&(0x7f00000004c0)=""/60, 0x3c}, {&(0x7f0000000500)=""/192, 0xc0}], 0x3, &(0x7f0000000600)=""/129, 0x81, 0x8}, 0x7}, {{&(0x7f00000006c0)=@pptp, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000740)=""/249, 0xf9}, {&(0x7f0000000840)=""/33, 0x21}, {&(0x7f0000000880)=""/76, 0x4c}, {&(0x7f0000000900)=""/157, 0x9d}, {&(0x7f00000009c0)=""/43, 0x2b}], 0x5, &(0x7f0000000a80)=""/144, 0x90, 0x3}, 0x5}, {{&(0x7f0000000b40)=@l2, 0x80, &(0x7f0000002280)=[{&(0x7f0000000bc0)=""/157, 0x9d}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/226, 0xe2}, {&(0x7f0000001d80)=""/252, 0xfc}, {&(0x7f0000001e80)=""/200, 0xc8}, {&(0x7f0000001f80)=""/240, 0xf0}, {&(0x7f0000002080)=""/168, 0xa8}, {&(0x7f0000002140)=""/37, 0x25}, {&(0x7f0000002180)=""/137, 0x89}, {&(0x7f0000002240)=""/14, 0xe}], 0xa, 0x0, 0x0, 0x1}, 0xfff}], 0x4, 0x12160, &(0x7f0000002440)) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000002480)) [ 538.563649] IPVS: length: 193 != 8 15:29:46 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xffffffff00000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfd000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 538.768413] FAT-fs (loop1): bogus number of reserved sectors [ 538.774696] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:46 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfdffffff}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 538.838820] IPVS: length: 193 != 8 [ 538.905331] IPVS: length: 193 != 8 [ 539.060115] IPVS: length: 193 != 8 15:29:46 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty=0xfd000000}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:46 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x2000000000000) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:29:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfdffffff]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:46 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000001600)='/dev/zero\x00', 0x14201, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000001640)='/dev/vcs#\x00', 0x2, 0x101003) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) setsockopt(r1, 0xfff, 0x2, &(0x7f0000001540)="2a5409bdf70064e586b4219fd00266c26f0ca5999fe210c8cd40ac9e15a175fda8f9c3998c0f7ff24608c14eeacd02cad6eaad71964678bb4719b9dc482285d4685e7d6f07f8549f83b6d7d02a5c2f57fe260d11b9f7a4492080821d7758b471f0a60ccaf8ee65e6f81e6081ec9a5701e99be4a6a48305f0c77093541ecf", 0x7e) recvmsg$kcm(r1, &(0x7f0000001380)={&(0x7f0000000080)=@l2, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/211, 0xd3}, {&(0x7f0000000100)=""/31, 0x1f}, {&(0x7f00000002c0)=""/137, 0x89}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0x1f}, 0x40010120) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f00000015c0)=0x77) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000013c0)=@assoc_value={0x0, 0x912}, &(0x7f0000001400)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001440)={r2, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f0000001500)=0x84) 15:29:46 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xf0a000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000840)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e4820bb8797c9347a1a9e6061769d169908a2c27a753a68220a1ad20853e4e4589f90315d7da4724797861361db10efd5bea2b42924cbe2f0080000ec000000001d366369d8223be05887b04a2b423b1a017bad13144975f529571024877dcdd7bf800000e44b23a3a3a73d61000085a7e97ce70a6517c1df50bfde7fbd49f215dd011db41f5efc6e9001f0b9eb449446a08f3fb12d5f133612ae9ca25f1550f2fd668a071b2bfff234b472e3bb6b8a306bb4334ccdaf9e57cb32faa95e723eb66d6dccc68b54658be1b3537831263ac7233c655bbfc0a6277d6e39a2e9992fb86f714a3314232f78a84fa000daa1c0e8fb64ecbc35476f80e84b59686327a0a27f7047eb9102c7"], &(0x7f00000002c0)=0x1) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000004c0)) r1 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendto$llc(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r1, &(0x7f0000000200), 0x0) recvmmsg(r1, &(0x7f000000cd80)=[{{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f00000000c0)=""/132, 0x84}], 0x3, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x1, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x10000, 0x0) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.capability\x00') ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000600)) recvmmsg(r1, &(0x7f00000064c0)=[{{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005880)=""/105, 0x69}, {&(0x7f0000005900)=""/48, 0x30}, {&(0x7f00000059c0)=""/175, 0xaf}], 0x3, &(0x7f0000005b00)=""/142, 0x8e}, 0x6}, {{&(0x7f0000005e00)=@rc, 0x80, &(0x7f0000006040)}, 0x80000001}, {{&(0x7f0000006080)=@nl, 0x80, &(0x7f00000063c0)=[{&(0x7f0000006200)=""/208, 0xd0}], 0x1, &(0x7f0000006400)=""/136, 0x88, 0x8}, 0x7}], 0x3, 0x2000, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'bpq0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000540)=0x4, 0x8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000300)={0x0, 0x0, 0x10003, 0xffffffffffff8000}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000280)={0xfffffffffffffffe, r5}) connect$vsock_dgram(r2, &(0x7f0000000340)={0x28, 0x0, 0x2710}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) dup2(r6, r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000640)={0x0, 0x8000, 0x800, 'queue1\x00'}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000800)={0x10000004}) [ 539.260513] FAT-fs (loop1): bogus number of reserved sectors [ 539.266540] FAT-fs (loop1): Can't find a valid FAT filesystem [ 539.290637] IPVS: length: 193 != 8 [ 539.317891] IPVS: length: 193 != 8 15:29:46 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x498, 0x0, 0x17, 0xffffffffffffffff}, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f8184aa7435ad13, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:29:46 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x4, [{{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xf}, 0xf1bb}}, {{0xa, 0x4e20, 0x7ff, @loopback, 0xff}}, {{0xa, 0x4e23, 0x40}}, {{0xa, 0x0, 0x0, @remote}}]}, 0x290) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x6b1, 0x101000) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000300)=@req={0x8, 0xc00000000000, 0x3f, 0x985e}, 0x10) [ 539.395060] IPVS: length: 193 != 8 15:29:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@posixacl='posixacl'}]}}) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x8}, 0x4) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000200)={0x4, 0x80000001, 0x6, 0x6}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) sendto$inet(r1, &(0x7f00000002c0), 0x2dd, 0x4040000, &(0x7f0000000300)={0x2, 0x4e23, @rand_addr}, 0xfffffffffffffd61) socketpair(0x10, 0x803, 0x3, &(0x7f0000000080)={0xffffffffffffffff}) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x10000, 0x8000) getsockopt$XDP_MMAP_OFFSETS(r6, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x60) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e319aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0001c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @remote}, 0x10) shutdown(r0, 0x1) shutdown(r0, 0x1) 15:29:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x3f00000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:46 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./bus\x00', 0x6, 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xb338) 15:29:46 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x20000005, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000000000002000f3ff00000075"], 0x24, 0x0) 15:29:47 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x230b000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:47 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x84800) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000002c0), &(0x7f0000000400)=0x2a3) r1 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0x40087602, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000040)=0x1) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000500)={0x4, 0xdb}) socket$inet6(0xa, 0x5, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)='security.capability\x00', &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0xfffffffffffffffd}, {0x7}], r2}, 0x18, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x101000, 0x0) ioctl(r0, 0x7ff, &(0x7f00000001c0)="153f6234488dd25d766070") ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000180)=[0x2], 0x1, 0xb2cd, 0xffffffffffffffff, 0x5, 0x6, 0x9, {0x7, 0x4, 0x5, 0x8, 0x2, 0x5, 0xe0000, 0x7, 0x3f, 0x7ff, 0xee, 0x0, 0xe98a, 0x1, "6a53dfa949c96d0231eedef99e90f96e0d4d8b82d5e792aaaa8308dd51915e7e"}}) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x92, 0x101200) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000100)=0x1f, 0x4) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000bc0)="63535b917e0ccbc9f25f7b78ea4b09fd868b5e5811d6747768599d3f13d96e8715175319ef7fb478245276a19344964a5800001000000000000002000000000073c003b661d5e78b5c1084cea20a50e9098a6cf5108744031f6e2f4e8615185714d0b05b987acaf39de83bb9fe85f43f6310c53fbd8cbe03fd7c6dbbb6f3de7a943d805ba946db47788531217403b2ce83f6c58b15ee902d5a93ad2f7f8c2a13524be3e52faac97e799ef42c233711cc46d736") ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000600)) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000280)={0xc4, &(0x7f0000000640)=""/196}) r4 = dup2(r0, r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x40080, 0x0) getsockname$netlink(r4, &(0x7f0000000080), &(0x7f00000003c0)=0xfffffcd8) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) perf_event_open(&(0x7f00000007c0)={0x3, 0x70, 0x5, 0x3, 0x4, 0x28c75795, 0x0, 0x2, 0xc, 0xa, 0x400, 0x0, 0x6, 0x84db, 0x3, 0x9, 0x4, 0x134, 0x8, 0x6, 0xfffffffffffffff8, 0x196, 0x7fffffff, 0xb5, 0x100000000, 0x2, 0x0, 0x10000, 0x1, 0x1, 0xc7c4, 0x0, 0x3, 0x6, 0x5, 0xd638, 0x7, 0x5, 0x0, 0x9, 0x0, @perf_config_ext={0x1ac4b2cc, 0x7}, 0x1000, 0x1, 0x5, 0x3, 0xa2, 0x5, 0x9}, r5, 0x5, r3, 0xa98b731d9cd73cfa) [ 539.716727] IPVS: length: 193 != 8 15:29:47 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) sendto$inet(r0, &(0x7f0000000480)="1e37e665e5253a863e5e0c3ade04e79cc79831e6f91aa02d9f4556e5f77082f1d7ad6a62e7cc8d63ec7f0af9c8967632e33b907f523c204ef2abcd56f5d969894dc792f18ff027bc17df32fdf896e5768c8e89eff1f880166b6c6319be641f08494efbae04f3664e8ffcd9d3617d2fcc4cce618fb29c4d0d82dfed8191572e9856340653d64d55953712cdbab8d54449b48213e08453e8ad3a49c1f4c8ee959e084840d7b4bed94b3369391ae5450996f8cb408a7ef93c444dd35dbcac22e9011d4969ada05f14c26246608a250eda56c53c38e1b3a1", 0xd6, 0x20004040, &(0x7f0000000580)={0x2, 0x4e22, @local}, 0x10) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x20800000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000640)={&(0x7f0000000600)='./bus\x00', r0}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000400)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x8000, @mcast2, 0x7}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x8, @loopback, 0x2}], 0x68) close(r2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000005c0)={0x0, 0x8}, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000003c0)=0x6) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000680)={0x9d72, {{0x2, 0x4e24, @rand_addr=0x8c41}}}, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x19}, @loopback, @remote, 0x8, 0xfc, 0x401, 0x400, 0x3, 0x80000, r3}) [ 539.806787] FAT-fs (loop1): bogus number of reserved sectors 15:29:47 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x100000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) mknodat(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) close(r1) fstatfs(r0, &(0x7f00000002c0)=""/4096) [ 539.848663] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:47 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000200)={@dev, 0x0}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x1d}, @loopback, @remote, 0x879, 0x6, 0x2, 0x100, 0x595, 0x80000000, r1}) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)="631534d0da080000001d70e400006ba500000ed7", 0x2761, 0x0) r3 = add_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)="6391e9aedb7b9b8b3eb536aa9cb0b85c471f378b67c76081734499849c67cb011cea381c27f6cae2e78d437df85eb8df9d12f429e63ffe5999ec3f514ab29c3f508c00e83e69360ebd71d854259cc55e23bcb3df", 0x54, 0x0) r4 = add_key$user(&(0x7f0000000600)='user\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000400)="e6ce277d70aa7659d7fe52298c1e423f588d69ba62f4463abba973eadcd33c0a7b75a9b8e0dda425976e", 0x1bd, r3) r5 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)="631534d0da080000001d700400", 0xfffffffffffffff9) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000300)=0x0) ptrace$peek(0x3, r6, &(0x7f0000000340)) keyctl$link(0x8, r4, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xa}, 0x3}}, [0x4, 0x9, 0x5, 0x3f, 0x3f, 0xdbf4000000000000, 0x80000001, 0xff, 0xf8, 0x5, 0x1, 0x6, 0x1000, 0x0, 0x8]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={r7}, 0x8) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) fcntl$setflags(r2, 0x2, 0x1) 15:29:47 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x8b, 0x8, [0xfffffffffffffffd, 0x3f, 0x9, 0x8, 0xdc, 0x3, 0x1, 0x3]}, &(0x7f0000000100)=0x18) [ 540.033973] IPVS: length: 193 != 8 15:29:47 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8000000000000001, 0x2000000000001) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000b7c000/0x4000)=nil, 0x4000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)}}, 0x20) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000000)) 15:29:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x80c0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYRESDEC]) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="0001", 0x2, 0xfffffffffffffffd) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000240)='/dev/mixer\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r2, 0x7, &(0x7f0000000640)={0x3, 0x2, 0x3f, 0x100000001, r4}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000680)) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r1, r3}, &(0x7f0000000440)=""/240, 0xf0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000140)={0x0, r5, 0x1ff, 0x6}) 15:29:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000006c0)='/dev/usbmon#\x00', 0xffff, 0x40040) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000700)=0xf7c, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1000000000004) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="0f0103f26d67f2f7320fc79b000000000f01cbc4c23dab8b0a000000f2a3381dd45266baf80cb8bcbd3f80ef66bafc0cb803000000ef0f239df20f5a5b00", 0x3e}], 0xaaaacd8, 0x0, &(0x7f0000000140), 0x0) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000640)) ioctl$KVM_RUN(r3, 0xae80, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)='+cpusetselfselinux\x00', &(0x7f00000000c0)='/dev/kvm\x00', &(0x7f0000000180)='/dev/kvm\x00', &(0x7f00000001c0)="2f0b3156a8", &(0x7f0000000200)='/dev/kvm\x00'], &(0x7f00000005c0)=[&(0x7f00000002c0)='/dev/kvm\x00', &(0x7f0000000300)='vmnet0!/ppp0-#self\x00', &(0x7f0000000340)='/dev/kvm\x00', &(0x7f00000003c0)='/dev/kvm\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='/dev/kvm\x00', &(0x7f0000000480)='/dev/kvm\x00', &(0x7f00000004c0)='/dev/kvm\x00', &(0x7f0000000580)='\'\x00'], 0x1000) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TIOCGSOFTCAR(r4, 0x5419, &(0x7f0000000680)) r5 = semget(0x3, 0x0, 0x380) semtimedop(r5, &(0x7f0000000380)=[{0x0, 0x1f}, {0x3, 0x9, 0x1800}, {0x1, 0xff, 0x1800}, {0x5, 0x80000000, 0x1000}, {0x3, 0x0, 0x800}, {0x2, 0x20, 0x1000}], 0x6, &(0x7f0000000780)={0x77359400}) 15:29:47 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x370c000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 540.171097] IPVS: length: 193 != 8 15:29:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000200)={0x1a, 0x10f, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x7}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000006c0)={r2, 0x6, 0x4, 0x4}, &(0x7f0000000700)=0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x3d8, 0x220, 0x220, 0x220, 0x0, 0x220, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000000), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x15}, 0xffffffff, 0xff, 'rose0\x00', '\x00', {}, {}, 0x7f, 0x1, 0x8}, 0x0, 0xc8, 0x108, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x1f}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x7, 0x0, 0x50be, 0x1, 0x5, 0x7, 0x1ff, 0xfff]}}}, {{@uncond, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7, [0x400, 0x8000, 0xe20, 0x7ff, 0xffffffffffffc425, 0x7], 0x8, 0x4, 0x1}, {0x9, [0x7fffffff, 0x1f, 0x7, 0xffff, 0x4, 0x101], 0x6, 0x8, 0x9}}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0x40, 0xf136}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x9, 0xe, [0xe, 0x2b, 0x3c, 0x16, 0x30, 0x3e, 0x3c, 0xd, 0x36, 0x11, 0x18, 0xf, 0x15, 0x21, 0x1c, 0x22], 0x1, 0x100000001, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, &(0x7f00000000c0)) 15:29:47 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x400000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 540.274011] FAT-fs (loop1): bogus number of reserved sectors [ 540.279883] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:47 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/70, 0x46}, {&(0x7f00000000c0)=""/128, 0x80}], 0x2, 0x0) 15:29:47 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x185, 0x400) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000100)={&(0x7f00000000c0)=[0x82, 0x8, 0xed, 0x50, 0x0, 0x800, 0xb84, 0x3, 0x9], 0x9, 0x94, 0x1ff, 0x2, 0x3, 0x8, {0x100000000, 0x0, 0x100, 0x4, 0x0, 0xffffffff80000001, 0x3ff, 0x6, 0x0, 0x9, 0x800, 0xdf67, 0x5, 0x40000000, "e16ece0babac2ac5f4245c2e9c305a222ba118236a2a9cfe8a1778d85a27cb1e"}}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) [ 540.426557] kauditd_printk_skb: 20 callbacks suppressed [ 540.426573] audit: type=1804 audit(1539617387.789:746): pid=22499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/353/file0/bus" dev="ramfs" ino=73055 res=1 [ 540.460341] IPVS: length: 193 != 8 [ 540.540970] IPVS: length: 193 != 8 15:29:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='ppp0vmnet1,self\\%\x00', 0x2) renameat(r0, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00') r2 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) [ 540.617997] audit: type=1804 audit(1539617387.869:747): pid=22519 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/353/file0/bus" dev="ramfs" ino=73055 res=1 15:29:48 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x4000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:48 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x63050000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 540.877250] FAT-fs (loop1): bogus number of reserved sectors [ 540.879970] IPVS: length: 193 != 8 [ 540.900293] audit: type=1804 audit(1539617388.265:748): pid=22545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/354/file0/bus" dev="ramfs" ino=71969 res=1 15:29:48 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x5) close(r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x2b, 0x896, 0x200}) [ 540.969563] FAT-fs (loop1): Can't find a valid FAT filesystem [ 541.024126] audit: type=1804 audit(1539617388.315:749): pid=22547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/354/file0/bus" dev="ramfs" ino=71969 res=1 15:29:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x80000000005, 0xb3fc, 0x805}) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x5, 0x4) [ 541.162596] IPVS: length: 193 != 8 [ 541.170628] audit: type=1804 audit(1539617388.523:750): pid=22547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/354/file0/bus" dev="ramfs" ino=71969 res=1 15:29:48 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x100000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:48 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfd]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:48 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xc37, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:48 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x100000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:48 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x4, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e23, @rand_addr=0x5}, {0x2, 0x4e21, @multicast2}, 0x180, 0x4, 0x4, 0x3, 0x2, &(0x7f0000000040)='ip6gre0\x00', 0x7, 0x80000001, 0x2}) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 15:29:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0xfffffffffffffffb, 0xb3fc, 0x5}) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) [ 541.427584] IPVS: length: 193 != 8 [ 541.475599] FAT-fs (loop1): bogus number of reserved sectors [ 541.478368] IPVS: length: 193 != 8 [ 541.492557] audit: type=1804 audit(1539617388.851:751): pid=22582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/355/file0/bus" dev="ramfs" ino=72033 res=1 [ 541.492852] FAT-fs (loop1): Can't find a valid FAT filesystem [ 541.534222] IPVS: length: 193 != 8 15:29:48 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x1000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:48 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5e3a, 0x440800) write$P9_RWSTAT(r0, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) fsync(r1) 15:29:49 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x5d, &(0x7f0000000080), 0x0) mlockall(0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0)=0x31, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x847, 0x40) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000380)={0x1f, 0x0, 0x3, 0x6}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f00000003c0)={0x4, r4}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000640)="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", 0xec4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, r5, 0x1, 0x6, 0x6, @dev={[], 0x11}}, 0x14) mmap(&(0x7f000027d000/0x1000)=nil, 0x1000, 0x2, 0x4010, r0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000400)={0x9}, &(0x7f0000000440), &(0x7f0000000580)={0x77359400}, 0x8) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x45, 0x2) r7 = socket(0x3, 0xf, 0x9) setsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000340)={0x0, 0x3}, 0x8) write$binfmt_misc(r6, &(0x7f0000001fc0)=ANY=[@ANYBLOB="f3797a31cc85973822f170dc84a1c5e81cabf5d5f26702aad7cc736f7a86dbbc759b27fd2d87ec7a33e52af8b1c2de04ce465bdcebbdd26fd479c684e5e9089fa071da0cea518149a52e9fdf1462ecdea6f14593918ca7fddd15982cfc0b4cbff0f86d3653baffe603d62d4b59c22db0d9871ae26609fd5720c2fb3b4ebf838bef982f97085b25d06fe942f833ad6a08bb52a84b97c7633b8071c96fac55e8b59bc23f701def2913b1107544d12e670d2d79c1ee12afeb7c2c3e0fbe8d9defd8dd6e74ee0457709d10df0c8f5f97d920437cb39c4fda124ee199910573ebbeeb12b430442af901b33acc28451fff8cb4f0f1d0c981e15f4daa7b6310c5d7d8ac42e8b103fc0e8e1ef4830d67736481470b4513bbf8449d5e34b92d4b6a40022923000000000000000000000000"], 0x12d) r8 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x8000) setsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000300)=@int=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ptrace$getsig(0x4202, r9, 0x6, &(0x7f00000000c0)) openat(r2, &(0x7f0000000100)='./file0\x00', 0x200, 0x1d1) [ 541.646160] audit: type=1804 audit(1539617388.999:752): pid=22586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/355/file0/bus" dev="ramfs" ino=72033 res=1 [ 541.652652] overlayfs: failed to resolve './file1': -2 [ 541.719961] IPVS: length: 193 != 8 [ 541.741772] audit: type=1804 audit(1539617389.069:753): pid=22586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/355/file0/bus" dev="ramfs" ino=72033 res=1 15:29:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountstats\x00') ioctl$KDDISABIO(r0, 0x4b37) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffffc}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r3, 0x2}, 0x8) close(r2) 15:29:49 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000012c0)='/dev/usbmon#\x00', 0x6, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x2761, 0x0) r2 = fcntl$getown(r1, 0x9) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000001c0)=""/131) r3 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000280)="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", 0x1000, 0x0) keyctl$revoke(0x3, r3) kcmp(r2, 0x0, 0x7, r1, r1) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) openat$cgroup_ro(r1, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) [ 541.784859] IPVS: length: 193 != 8 15:29:49 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x370c0000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x3f00]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 541.856187] overlayfs: failed to resolve './file1': -2 15:29:49 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x2000000080045700, &(0x7f0000000000)) ioctl$KDSETLED(r0, 0x4b32, 0xfffffffffffffbff) 15:29:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x1, &(0x7f0000000140)="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") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) sendto$inet6(r1, &(0x7f00000000c0)="030300000700600000000000fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053c0e385472da7222a2bb401000000c3b50035110f118d0000f55dc62600009b000000faffffff00000000aeb46245004bad2a66c9c1cfdf56fc88046a", 0x6c, 0x0, &(0x7f0000000000)={0xa, 0x200800800, 0x4, @mcast2}, 0x1c) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffff, 0x0) 15:29:49 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="f9a1148863f563d02f7a11c869915b10bb7517b2c7105cf1bca00c350f58be60cbf38166b3f518d68d5428fbaa19e7e606f70b058aa437295260a4c71d06889d0b8db7ab1e2f899d207e4f041d6c98e7839e7504a4fe55ee00c3ffd43e92d5f0bcb51a47c2e353104fcb4814a8790bec90610da5fcc880f0767aa06b6e7e7b9bfd8d52f8a5575e66b6bcee70c7de2ebb04a41f0db0ea25ed0c9de3f3d3133b8f85ab81e1f5f76136c4345c04fb86211e1755adaca4e7a4b97909f60bcd15dac3eb59ebf92b3d36f229213bc4a39ab27850e720f52d086ec4b381a63c6807256b6b0ab46257845b1a334d", 0xea) [ 542.021063] FAT-fs (loop1): bogus number of reserved sectors [ 542.028516] FAT-fs (loop1): Can't find a valid FAT filesystem [ 542.068964] audit: type=1804 audit(1539617389.426:754): pid=22627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/356/file0/bus" dev="ramfs" ino=72106 res=1 [ 542.108511] IPVS: length: 193 != 8 15:29:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="10"], 0x1) accept4$unix(r1, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x80800) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) [ 542.179498] IPVS: length: 193 != 8 [ 542.196258] audit: type=1804 audit(1539617389.475:755): pid=22621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/356/file0/bus" dev="ramfs" ino=72106 res=1 15:29:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x4]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:49 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x200141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x1012, r0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) close(r1) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f00000000c0)=""/136) 15:29:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)="2f67726f75702e73746174003c23fb572a1f0294e6f395d22091eafec678b41aed4b4d9d9a1f63f8785ad188a7e1c88875e05b18b1bc3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034483b157624c59c0100e89e6a357c0400000000000000890794cb864b69259afe22a98591938f4b63af38da35f057dc8eb56eff2e23c51b940706ac86729f57774015aea8eb0b1b8b3832a9b657b381c56af1d30f5116011843036982f43497c551110000000000000000", 0x2761, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) [ 542.516152] IPVS: length: 193 != 8 [ 542.596643] IPVS: length: 193 != 8 15:29:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="10"], 0x1) accept4$unix(r1, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x80800) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 15:29:51 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x705, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:51 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfd00000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)="2f67726f75702e73746174003c23fb572a1f0294e6f395d22091eafec678b41aed4b4d9d9a1f63f8785ad188a7e1c88875e05b18b1bc3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034483b157624c59c0100e89e6a357c0400000000000000890794cb864b69259afe22a98591938f4b63af38da35f057dc8eb56eff2e23c51b940706ac86729f57774015aea8eb0b1b8b3832a9b657b381c56af1d30f5116011843036982f43497c551110000000000000000", 0x2761, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000100)={0x9, {{0xa, 0x4e20, 0x4, @local, 0x1}}}, 0x88) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x0, 0x40000000000b3fc, 0x8}) lookup_dcookie(0x4, &(0x7f00000000c0)=""/38, 0x26) 15:29:51 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) syz_open_dev$sndmidi(&(0x7f0000000300)='/dev/snd/midiC#D#\x00', 0x7, 0x313000) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000940)) gettid() recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=""/20, 0x14}, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x456) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000008c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000b80)={0x14, 0x5, 0x1}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000b40)=""/23) ioctl$RTC_UIE_ON(r0, 0x7003) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) [ 544.311811] FAT-fs (loop1): bogus number of reserved sectors 15:29:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x5}) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000340), &(0x7f00000003c0)=0x4) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000280)={0x0, 0x0, 0x2}, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 544.361669] IPVS: length: 193 != 8 [ 544.366540] FAT-fs (loop1): Can't find a valid FAT filesystem [ 544.399929] IPVS: length: 193 != 8 15:29:51 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = fcntl$getown(r0, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000080)='md5sum\x00'}, 0x30) kcmp(r1, r2, 0x0, r0, r0) connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x10000000, 0x0, 0x0, 0x0, 0x0, "f982532be2d4461e19f18c70116a412214cb388c8bed5cb122b28f1e4716fd22e2c40acc2faa08963b027f1615f98208e79a629d6b790c1e2ea4b0de37605a", 0x2d}, 0x60) r4 = dup3(r3, r3, 0x80000) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000100)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x50, r0, 0x0) 15:29:51 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xaa, 0x10000) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.stat\x00', 0x2761, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) ioctl$KDADDIO(r0, 0x4b34, 0x3fd7) 15:29:51 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x800000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:51 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xcf0f, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:52 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc}, 0x14) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x210200, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0xd6c1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000001c0)=""/35) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfc, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r4 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r5 = gettid() ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000280)={0x8, 0x6}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, r5) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x5) tkill(r5, 0x401104000000014) [ 544.666643] IPVS: length: 193 != 8 [ 544.740607] IPVS: length: 193 != 8 [ 544.768025] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 544.824599] FAT-fs (loop1): bogus number of reserved sectors [ 544.846121] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:52 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x1c02]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:52 executing program 4: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x18) mkdirat(r4, &(0x7f0000000180)='./file0\x00', 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x2, r0}) recvmsg(r2, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r1, r2) tkill(r0, 0x15) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) wait4(r5, 0x0, 0x60000002, &(0x7f0000000000)) [ 545.148287] IPVS: length: 193 != 8 15:29:52 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xcb01, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000001300), &(0x7f00000011c0), &(0x7f0000000280)) mount(&(0x7f0000001440), &(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) wait4(0x0, &(0x7f0000000180), 0xa0000000, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000001340)=""/82, 0x52) r1 = fcntl$getown(r0, 0x9) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x3f) [ 545.206596] IPVS: length: 193 != 8 15:29:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002700)={&(0x7f0000000140), 0xc, &(0x7f00000026c0)={&(0x7f0000002400)=@flushsa={0x14, 0x1c, 0x23}, 0x14}}, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$dmmidi(&(0x7f0000001a40)='/dev/dmmidi#\x00', 0xfffffffffffff800, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000240)={0x1}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000001600)={0x79, 0x0, [0xfffffffffffffff8, 0x1, 0x22d5, 0x3]}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f00000001c0)={0x0, 0xc804, 0x6, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000100)="482e2cf215c6", &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000080), 0xfffffff6}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000500)={'erspan0\x00', 0x1000}) r7 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000000c0), &(0x7f0000000280)="19", 0x1, r7) r9 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r1) r10 = creat(&(0x7f0000000100)='./file0\x00', 0x80) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pipe2(&(0x7f00000016c0), 0x0) write$evdev(r10, &(0x7f0000000440)=[{{}, 0x5, 0x8, 0x3}, {{r11, r12/1000+30000}, 0x17, 0x7fff, 0x5}, {{0x0, 0x2710}, 0x16, 0x0, 0xf1}, {{0x0, 0x7530}, 0x0, 0x1, 0x4}, {{}, 0x17}, {{0x77359400}, 0x16, 0x2, 0x1}], 0x90) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r8, r9, r8}, &(0x7f0000a53ffb)=""/5, 0x3ca, &(0x7f0000000180)={&(0x7f00000002c0)={'sha1-generic\x00'}}) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x1000, 0x8000) sendmsg$nl_xfrm(r5, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000001880)=@getsa={0x9c, 0x12, 0x20b, 0x70bd2c, 0x25dfdbfb, {@in=@local, 0x4d6, 0xa, 0x3c}, [@algo_comp={0x6c, 0x3, {{'deflate\x00'}, 0x120, "b2641766e658b32354e35438c31142a3564e9f398ddb167f2a033a9e58b58c778eccffc3"}}, @tfcpad={0x8, 0x16, 0x1f}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) 15:29:52 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000000c0)={0x7c29, 0xfffffffffffffffb, 0x5, 0x8000, 0x12, 0x1fac6667}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:52 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x1c02]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:52 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x4000000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 545.360054] FAT-fs (loop1): bogus number of reserved sectors [ 545.389273] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002700)={&(0x7f0000000140), 0xc, &(0x7f00000026c0)={&(0x7f0000002400)=@flushsa={0x14, 0x1c, 0x23}, 0x14}}, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$dmmidi(&(0x7f0000001a40)='/dev/dmmidi#\x00', 0xfffffffffffff800, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000240)={0x1}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000001600)={0x79, 0x0, [0xfffffffffffffff8, 0x1, 0x22d5, 0x3]}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f00000001c0)={0x0, 0xc804, 0x6, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000100)="482e2cf215c6", &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000080), 0xfffffff6}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000500)={'erspan0\x00', 0x1000}) r7 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000000c0), &(0x7f0000000280)="19", 0x1, r7) r9 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r1) r10 = creat(&(0x7f0000000100)='./file0\x00', 0x80) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pipe2(&(0x7f00000016c0), 0x0) write$evdev(r10, &(0x7f0000000440)=[{{}, 0x5, 0x8, 0x3}, {{r11, r12/1000+30000}, 0x17, 0x7fff, 0x5}, {{0x0, 0x2710}, 0x16, 0x0, 0xf1}, {{0x0, 0x7530}, 0x0, 0x1, 0x4}, {{}, 0x17}, {{0x77359400}, 0x16, 0x2, 0x1}], 0x90) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r8, r9, r8}, &(0x7f0000a53ffb)=""/5, 0x3ca, &(0x7f0000000180)={&(0x7f00000002c0)={'sha1-generic\x00'}}) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x1000, 0x8000) sendmsg$nl_xfrm(r5, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000001880)=@getsa={0x9c, 0x12, 0x20b, 0x70bd2c, 0x25dfdbfb, {@in=@local, 0x4d6, 0xa, 0x3c}, [@algo_comp={0x6c, 0x3, {{'deflate\x00'}, 0x120, "b2641766e658b32354e35438c31142a3564e9f398ddb167f2a033a9e58b58c778eccffc3"}}, @tfcpad={0x8, 0x16, 0x1f}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) [ 545.509139] kauditd_printk_skb: 11 callbacks suppressed [ 545.509155] audit: type=1804 audit(1539617392.837:767): pid=22755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/359/file0/bus" dev="ramfs" ino=72317 res=1 [ 545.600466] audit: type=1804 audit(1539617392.917:768): pid=22776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/359/file0/bus" dev="ramfs" ino=72317 res=1 [ 545.605457] IPVS: length: 193 != 8 [ 545.647400] IPVS: length: 193 != 8 15:29:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002700)={&(0x7f0000000140), 0xc, &(0x7f00000026c0)={&(0x7f0000002400)=@flushsa={0x14, 0x1c, 0x23}, 0x14}}, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$dmmidi(&(0x7f0000001a40)='/dev/dmmidi#\x00', 0xfffffffffffff800, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, r1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000240)={0x1}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x200, 0x0) ioctl$KVM_ENABLE_CAP(r5, 0x4068aea3, &(0x7f0000001600)={0x79, 0x0, [0xfffffffffffffff8, 0x1, 0x22d5, 0x3]}) r6 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f00000001c0)={0x0, 0xc804, 0x6, 0x0, @scatter={0x0, 0x384c8, &(0x7f00000004c0)}, &(0x7f0000000100)="482e2cf215c6", &(0x7f0000000600)=""/4096, 0x0, 0x0, 0x0, &(0x7f0000000080), 0xfffffff6}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000500)={'erspan0\x00', 0x1000}) r7 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000000c0), &(0x7f0000000280)="19", 0x1, r7) r9 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r1) r10 = creat(&(0x7f0000000100)='./file0\x00', 0x80) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) pipe2(&(0x7f00000016c0), 0x0) write$evdev(r10, &(0x7f0000000440)=[{{}, 0x5, 0x8, 0x3}, {{r11, r12/1000+30000}, 0x17, 0x7fff, 0x5}, {{0x0, 0x2710}, 0x16, 0x0, 0xf1}, {{0x0, 0x7530}, 0x0, 0x1, 0x4}, {{}, 0x17}, {{0x77359400}, 0x16, 0x2, 0x1}], 0x90) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r8, r9, r8}, &(0x7f0000a53ffb)=""/5, 0x3ca, &(0x7f0000000180)={&(0x7f00000002c0)={'sha1-generic\x00'}}) syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x1000, 0x8000) sendmsg$nl_xfrm(r5, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000001880)=@getsa={0x9c, 0x12, 0x20b, 0x70bd2c, 0x25dfdbfb, {@in=@local, 0x4d6, 0xa, 0x3c}, [@algo_comp={0x6c, 0x3, {{'deflate\x00'}, 0x120, "b2641766e658b32354e35438c31142a3564e9f398ddb167f2a033a9e58b58c778eccffc3"}}, @tfcpad={0x8, 0x16, 0x1f}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) 15:29:53 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x21c]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x4, 0x4011, r0, 0x1000000) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="04000000000000003c1b5fbca552636772537570", 0x1ff) 15:29:53 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xf000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:53 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x101, 0x2000) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7434, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 15:29:53 executing program 3: io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={0xfaaf}, 0x8}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) write$tun(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xc5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000003c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r2}}, 0x32b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), 0x8) close(r0) munmap(&(0x7f0000000000/0x3000)=nil, 0x3000) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x101, 0x143202) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x4) 15:29:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x6, {0x7f, 0xec, 0x3ff, 0x0, 0x6, 0x8}}) 15:29:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0x6, 0x5e, "471bbd433f4ea85b8b4e2416e52137003a90fe948808375da4f9795fff3309f1de2100b57000b2164ac2e3be122d8766ada1cba01911587e4ec718aab9a390ad53d133f9bb349f96ff38cb86b7f2bde60ba98940112dacd8674e057965fe"}, 0x66) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000200)=0x78) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000002c0)={0x28}, 0x4) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000300)={'mangle\x00', 0x3e, "1a5aa261becb9589e9167ef4cd2abe17c7674ebb0b32c68da2b3b103dda2e971ab7cde8aef460eb1906f55ee2d76944f5093bb17e73281d3cfe2c47ed55d"}, &(0x7f0000000380)=0x62) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000400)={'bond0\x00', {0x2, 0x4e21, @multicast1}}) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000440)) mount$overlay(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x1400, &(0x7f0000000500)={[{@xino_off='xino=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@default_permissions='default_permissions'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'broute\x00'}}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000580)=0x9) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000005c0)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000600)={0x8000, 0x0, 0x3, 'queue0\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000006c0)={'rose0\x00', 0x3}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000700)={0x2, 'bond_slave_1\x00', 0x2}, 0x18) renameat2(r0, &(0x7f0000000740)='./file0/../file0\x00', r0, &(0x7f0000000780)='./file0\x00', 0x1) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000007c0)={0x8, 0x14, 0x2, 0x2, 0x80000000}) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000800)={r1, @in6={{0xa, 0x4e23, 0x10000000, @local, 0x3656e92a}}}, 0x84) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000900)={0x9, &(0x7f00000008c0)=[{0x80, 0x6}, {0x3ff, 0x1}, {0x1}, {0xfff, 0x100000000}, {0x2, 0x3}, {0x5, 0x81}, {0x3, 0x101}, {0x7, 0xe8}, {0x8, 0x81}]}) r2 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) syz_mount_image$erofs(&(0x7f0000000940)='erofs\x00', &(0x7f0000000980)='./file0\x00', 0x7, 0x5, &(0x7f0000000d00)=[{&(0x7f00000009c0)="65760a673fcdde236551ec4051326a2e1d46b06a474b7551d097f728ae2b0865e7265dc6873b579d2205268711af9a202552510a72648952c43cd1e4c600ac87ed16461dc384f7cdfa254ff0e22fda1b5905e3eb917ab73e781f0ed9c00a30f1f4342dca108f3c950d7f5c63624e3167093457c51a8e62facb73ea26d20ca875f00dd1f689843edaee2d980ccd", 0x8d, 0x3ff}, {&(0x7f0000000a80)="76fde1f33d7b16c336823fae03e5a122c326a78ba815fb24b377039700c6e247d55f91624cc8125cd5308bb532e2d68a3a18404c1d841ad0ad5b1cd2c3eb047ed4483b431db8bb950a19ad0483be3b03e0492ce247e0079661e59454f42897a18c881acef9bd36ed3502e042086c5b043115d873fd5d8b6f5e9392bbac5763a699f47b0c9ee01fde228d8cce95f6ee6e9c80", 0x92, 0xfffffffffffffff7}, {&(0x7f0000000b40)="3f3da439a72327909e79e8947031ad1aec38707309adfe4720ce30b26abef91d3bbe9311a6f7fba969c66f10f7b9218859a7265330a8a3fcad56cff7c5ce9974cd626c9cfa698c87f43b24a1e69f40a2755c497434af0f607d06de5f8435e3da99d7d11b5e58e9db20a7b222ed6e586990b684bca8ae55250a079dfde923f957828258e4806b8f2a71b36fa87e49822e2b38043b57a9198c14189f5938bcc52b0fc458ac7826385682a0401399f62b2c7da170927426ad9b483c1b54577476247c81db92e79639ee4a4205ee3ad8d21fcae4", 0xd2, 0x401}, {&(0x7f0000000c40)="089d832a04f6a8bef145b579e8a974784f", 0x11, 0x1}, {&(0x7f0000000c80)="dc719faf1684911583e85be83d9f9f8eba4c485570169a31bcf622be3e7717418aae470b74b68ccd114b9db4971ef2723c19d329f2e31ce52664c94b5e934526d3de841a61fb5607c04261e73fcf0a126d9ea5fa7494a57f", 0x58, 0x6}], 0x1040, &(0x7f0000000ec0)={[{@acl='acl'}], [{@uid_lt={'uid<', r2}}, {@hash='hash'}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r3}}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000f80)={&(0x7f0000000f40)='./file0\x00', r0}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000fc0)={r1, 0x400}, 0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffff) socketpair$inet(0x2, 0x800, 0x10000, &(0x7f0000001000)={0xffffffffffffffff}) getsockname(r4, &(0x7f0000001040)=@xdp, &(0x7f00000010c0)=0x80) [ 545.974721] IPVS: length: 193 != 8 [ 545.982151] FAT-fs (loop1): bogus number of reserved sectors [ 545.988003] FAT-fs (loop1): Can't find a valid FAT filesystem [ 545.996611] audit: type=1804 audit(1539617393.313:769): pid=22807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/360/file0/bus" dev="ramfs" ino=73407 res=1 15:29:53 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) read(r0, &(0x7f0000001140)=""/4096, 0x1000) read(r0, &(0x7f0000000100)=""/17, 0x11) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) [ 546.060728] IPVS: length: 193 != 8 15:29:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 15:29:53 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfd000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 546.105821] audit: type=1804 audit(1539617393.422:770): pid=22807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/360/file0/bus" dev="ramfs" ino=73407 res=1 [ 546.185085] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 546.254112] audit: type=1804 audit(1539617393.571:771): pid=22813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/360/file0/file0/bus" dev="ramfs" ino=72417 res=1 [ 546.271199] IPVS: length: 193 != 8 15:29:53 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0xfffffffffffffc00) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x10003, 0x80011, r0, 0x0) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='overlay\x00', 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="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"]) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vsock\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000700)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000c907000000000000000000000000000000000000000000000000"], 0x58) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x80) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0xb0, r4, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x26}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x40000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000840)=""/244) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000800)='./file0/file0\x00', r5}, 0x10) writev(r5, &(0x7f0000000080), 0x1a6) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote}}, {{@in6}}}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$RTC_AIE_OFF(r5, 0x7002) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000680)=""/26) 15:29:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x2, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x400, 0x10000) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e20, 0x2}}}, &(0x7f0000000340)=0x84) 15:29:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000a00)=""/4096) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) prctl$intptr(0x24, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) [ 546.371785] audit: type=1804 audit(1539617393.621:772): pid=22807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/360/file0/file0/bus" dev="ramfs" ino=72417 res=1 [ 546.400758] IPVS: length: 193 != 8 15:29:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0x40045730, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) close(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'bridge_slave_0\x00'}, 0x18) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x1, 0xb88d, 0xe954}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000100)) 15:29:53 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x78b, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:53 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x2000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 546.632353] FAT-fs (loop1): bogus number of reserved sectors [ 546.654885] FAT-fs (loop1): Can't find a valid FAT filesystem [ 546.662010] IPVS: length: 193 != 8 15:29:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x100000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400200, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000140)=0x100000000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000000c0)) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0xec0}, 0xc, &(0x7f00007a8000)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000b01ff0200000000000000000000"], 0x14}}, 0x0) [ 546.675908] audit: type=1804 audit(1539617393.997:773): pid=22872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/361/file0/bus" dev="ramfs" ino=72473 res=1 15:29:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000003c0)={"7c5988447dbbead65f62726964676500", 0x3}) syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget$private(0x0, 0x2000, 0xfffffffffffffffe, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/19) socket$inet(0x2, 0xe, 0x7) r4 = syz_open_procfs(0x0, &(0x7f0000000580)='fdinfo/4\x00') ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f00000005c0)={{0x2, 0x0, 0x7c9, 0x2, 0x6}, 0x2, 0x9}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r5, 0x8922, &(0x7f0000000200)={'rose0\x00'}) getsockname(r5, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000740)=0x7, 0x3) setsockopt$inet_int(r2, 0x0, 0xc, &(0x7f00000007c0)=0x8, 0x104) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x7fffffff}, &(0x7f00000002c0)) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000800)=""/32) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r6, @in6={{0xa, 0x4e21, 0xfffffffffffffffd, @loopback, 0x100}}, 0xfffffffffffffffe, 0x6}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x8, &(0x7f0000000400)=@raw=[@alu={0x7, 0x100000001, 0x5, 0xa, 0x9, 0x38, 0xfffffffffffffffc}, @generic={0x4, 0x1, 0x6615, 0x9}, @exit, @generic={0x8, 0x8, 0x9, 0x7}], &(0x7f0000000440)='GPL\x00', 0x5, 0x11, &(0x7f0000000480)=""/17, 0x41100, 0x9cdda18c2c76058c, [], r7, 0xe}, 0x48) r8 = dup2(r1, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') r10 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) accept4$unix(r9, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) r11 = request_key(&(0x7f0000000240)='user\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)='\x00', 0xfffffffffffffffe) keyctl$setperm(0x5, r11, 0x1000000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r8, 0xc0405519, &(0x7f0000000700)={0x5, 0x0, 0x55, 0xaeb, 'syz1\x00', 0x214}) ioctl$SCSI_IOCTL_DOORLOCK(r10, 0x5380) [ 546.729305] audit: type=1804 audit(1539617394.047:774): pid=22875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/361/file0/bus" dev="ramfs" ino=72473 res=1 [ 546.784705] IPVS: length: 193 != 8 [ 546.829545] audit: type=1804 audit(1539617394.146:775): pid=22875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/361/file0/bus" dev="ramfs" ino=72473 res=1 15:29:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x100000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400200, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000140)=0x100000000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000000c0)) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0xec0}, 0xc, &(0x7f00007a8000)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000b01ff0200000000000000000000"], 0x14}}, 0x0) 15:29:54 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x1c020000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/155, &(0x7f0000000140)=0x9b) 15:29:54 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xa70d000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x840000000000006) ioctl(r0, 0x8912, &(0x7f0000000000)="153f8dd25d76607000000000000000") unshare(0x400) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)={0xffffffffffffffff}) r2 = msgget(0x0, 0x10) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000040)=""/237) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14) 15:29:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@vsock, &(0x7f00000000c0)=0x80, 0x800) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000180)={0x7f, @rand_addr=0xcf, 0x4e22, 0x3, 'wrr\x00', 0x2, 0x9, 0xa}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000002f18)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0x2) [ 547.081213] FAT-fs (loop1): bogus number of reserved sectors [ 547.086725] IPVS: length: 193 != 8 [ 547.087200] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x566}, 0xfffffffffffffff3) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000300)) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x44801) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r0, 0x0, 0xd, &(0x7f0000000340)='/dev/binder#\x00'}, 0x30) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000200)={{0x1, 0x3, 0x1, 0x1, 0x100000000}, 0x4fdf, 0x2}) write$P9_ROPEN(r2, &(0x7f0000000440)={0x18, 0x71, 0x1, {{0x2, 0x3, 0x5}, 0x9}}, 0x18) syz_open_pts(0xffffffffffffffff, 0xc00) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x100) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) [ 547.122045] audit: type=1804 audit(1539617394.434:776): pid=22908 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/362/file0/bus" dev="ramfs" ino=73509 res=1 15:29:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000006280)=[{{&(0x7f0000002980)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002a00)="459b87a826560cd76182905de8477f66c6f152f917a7f61b07a442d50c1657b69cd4a3e4af2c8696b044b4e93f1b854ce89da68d61d8b342841fbec19040c6b7378dc6b41138177b80499d7ff4d7b95912b73d790dbe35d742e8505176ad222dc284b890c34a733914ebfeafc428b428bb29d546704f5f2ecd5439103ac2b3772a2f1a2efca1a9ebd00104c820a24874a1", 0x91}, {&(0x7f0000002ac0)="0fa100f63402fdc8f9775cc8ad48ad3f25160dc39fb360abeb34dcce0f5bbfe5c06401b323bee7403a9ecc391a6a6f286ea812b3dcd6350f6cbbc7240fad773082c9e2840b773bbdf2672f4c85b2e60ac0ead776c5e1f287b46ef055d61185f64c498fb2c168c555c3206ed257711f78e7d4fbb0d20141ef4998b247e274bcd588d3e8b47a62998328eadf6998ef2666cf45452e9d04c5578a8c2c2a1f1f8467301cacf28a563774c54a06293058aba5df4a295517de67b6c2eb915b8422d7c156e0174c7d7ce5e26e8706efa8653773bb491ecbebdbad", 0xd7}], 0x2, &(0x7f0000002c00)=[{0xb0, 0x111, 0x3, "594a9d30eb962ea74e60f878ef9e2b5b609252053a1629cbac1a8dccebec08b0a235528162e242e6885d0951886d758fb3338f5ac737b6d402056258f91904b2da4b3a4515db4a170f546f8358fb7236cf70c3483a14b5ea19b61dd0e107a1818a8e286a0635061c4e904d80ad9c5b24155af3c7f293cca8995827d8a0161afbd80159fa44fb103647f03e5210b13e9de1dde8c72976d47b059a88ec77062684"}, {0x48, 0x103, 0x5, "85a204dbb5f9e747ec826a2c49cf4525e48797a4d2edec6ff2da6ce4dd6993d7d62c8d14aa7935e7ef06f74db5a061cc9ed172a6"}, {0x90, 0x1, 0x1ff, "d6f60ccbfe1862b778cf0ddacd29edeecde1fa5e4f1ab26425702eb0ba9290634b60866d0a7cced2519dfe8670061c7b90eb0786dac8516de0805013957bdde1033ae042dd24048431ecd2d176399b9bf93f9a835e47a34dd29b83e1d0755ae49687bdf31b448d3dc6c649e9093d8f72d2392ab6f3a85aa00323aad3"}, {0xa0, 0x109, 0xa58, "528c92f18ba87d7bbda64324904f9c51591757bcc06af09455e20666fdb624dd9a8b6105e679d7de45a3b0231374b2f1c1a0c42901c8420d95700ab05b2019d961c203ad7e0c4df698e2fcd387a4977ef2be283f5c94791ccbd7ca91578eaa64b151e4622153cdbe69e85c22d95d3a2cf650b45bbb6e2472b93dbe49597b2ee11980e40b932938b05e4ab2e1"}], 0x228, 0x40001}, 0xdd6}, {{&(0x7f0000002e40)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000003480)=[{&(0x7f0000002ec0)="46bfbb826ae4ee9e2728c05da7d5734cba0c46ace896ac6524f2a685bee706d6800c38652611a298be3b5102aed2b540fe408b435e770d3fa8666e", 0x3b}, {&(0x7f0000002f00)="001b7c24e5c71fe20d3b57e5e78863f7348037e5ded2cbb11a541f04ba335628e5eaacc87447a214bc38d63354c2a40ef5d3ce8f06d8c7f7cc9205df4f85e9711ff4773ef39ab83b00", 0x49}, {&(0x7f0000002f80)="ff29d4d077e03091e733b526081e86ab826184e9fe3db7b25bc3b241ebb8fca2a4688a2d09e284299b87e562aa6fe2c9acd8e6861bd3293c1275f2b06ba8728a82650b4b295e318914aea83b6cd417fb1c09de18ddd28fe92a0d422a355080001aafb792359165b2", 0x68}, {&(0x7f0000003000)='O', 0x1}, {&(0x7f0000003040)="b84804b54595dad2fe2e3b0d54ac331c81cfd3dd961a62a4da9692aff8f999175c10b0639f2329ec1cd9e47d5b3ddf976a7149a109788d3ffce32f71f10fbbfb75b4201088a0de2dec0d6c3ebd", 0x4d}, {&(0x7f00000030c0)="0c8bdf675f0392abe06f464e8ded89092a368486ea673a9cb376c9d9518be3a58de43b836abe60c78dcbae27e4f2e13d5a65409476842e6f698845734b56143553b1eb08ca41944e5cd57a58ab56440d3f2ec672bedab570a364205e6b1ab17827afa60b586cfa05e4c7a394ff0e6e6989f430fb7cb9b26000e741cb0af2f90c3422c430a24785c4bd92f57b59ae21cc50240dc71032a23610cfb85ecb4fe18609bdbdcd0719a6149c7e9a17f38556695961ddb2651042de5c4a4f32d4d6332ecbab072cf5a22953eec906059fab3bdd803220b83fb76d3063447feed2d156d343526164bf5a914d5fd516a2c7b5b80e79", 0xf1}, {&(0x7f00000031c0)="ac9da1c6ef5b2ee25244e0bc13a89089a18a58e88473cb749feb5b88d20eb514ed9a4a526663da2a3d2b14b2ca", 0x2d}, {&(0x7f0000003200)="fa362147e25f5f6086b7b0d54c12a3228a403e6d00f2f1c0ca7db01d8e5d13134ab6836ffaade7bc808afe7aa48c5f3509e6beb83424f55d65e6ae29f4c892bda63e129b4e752fd278bf3ab5335a05cef04218c37a2b6ab85138", 0x5a}, {&(0x7f0000003280)="4b993ff04f874166d8ae38979cf8d85cb90b364f97bec4b7574a317bdab08acc79f9de3ef062331d4384df67ead58c096b42a6cc45d0596f6031db02ab82f90ec2ec0abc47956b79e330b2dd44b9fcdba4928d48c9cb656664bcb770471ec65fe63d6ce19ee8f64511ecbb5ba6e952f04c31794291e97a786c1741d81735b829283c84633d035333255c7d71e9919905175ed61e7c5c5617c0811f21d208dc57a5ec4c2e503f24e9f812d223d64370c37aea7e7e23233d20c7ddba9e66", 0xbd}, {&(0x7f0000003340)="95b3ac9a177f3b503064e3cf857826d2af6e9cb329e46f7d66eba482a97b0b0684f4bf399c919f277a72824aeff0d860794e7c24e1dbc511174f805d5b65c79a6ede6f8d510aa6", 0x47}], 0xa, &(0x7f0000003940)=[{0xc0, 0x11f, 0x1, "4bfa8eacd24c8948c2d678e3e51b9a32b0f588c0e8f0b892ebb7b8f46005973ea1f0f91963fd3baf769a12c74ab52113f430ea70150ced3ebd68c36ea89553bbae3ba5d650ed1f9fd434d4cd8d89f75ce0166592146eea6cad4d9e84d4f8c6fd70b80a3c2df30fad1a3993e8a586f913830ac62f818f1a06dba195a61b5f9e82583153a4175c450c44537847cf4b201ec620cb5caf880f785e2b039c80a26868e7e4a47aaa86c324dfaad80f"}, {0xd8, 0x117, 0x7fffffff, "5f4a3bdd6f977f13b627b0428bce62380f260b1169e248db8a90de314d1abc98e15983eef80302a5afae5ea1bb5f3fd449b34629be247178d6370d31b1d93d9168b0ccbe0b9980e91dcc5b50039d1b122bc6478eb99fb169cc848d2777d8e97dcbbc379c193f8f9015dc36e9ddb84a4f92f6cb8fae7bc6101ab033ce9757417e67dd2b8ac5e08bcb4668cf13d358877daeb84bb00f6e01f446d79eaeada62bd624cc939145e1418d5cf0151ce0e7e44bec3e00b7f13c4bdcd8a2e0c9365e5154e67e64"}, {0x38, 0x3a, 0x1, "8f51061198e92a119543cf3535750ca1f201d79a8c1c44ad36afdcd53668e9220e6e4de440c9ec93"}, {0x108, 0x0, 0x0, "9e213bc28ae9ef2a7842bca40e9df1dbbe269d4d8f1194f3fc849fb84a48a32c39568c836228296367fc5d98ba89f30608c73199a8d7f115d4c986f1cf64354abd526cd6844986012b163c862978478cea2b802f080f3bfd63b9a3448123b20bb8c554aab60c208b56ec7500982dfbcda8b6674ed6c494b112da05cc0f495607c77474d290a1c6cb466e7615fb690535b00bb9e7d118ee33db7679de0e1bd2389641ce773c7abbbafc83f3aaea38f568024e08b1ae2c789137151cd805d573d39c04e09e064f30de3bd6f106dd04e5d5eb66adc9196328db5cd9f7cb5516ce0f6ed50691c06551f20ada0bc6f9c192d60c6f5aaa"}, {0xb0, 0x84, 0xcdfe, "83c49ee459c3240d2f7fb881dc48ee2d310ae14883fd73343f723e3429a4cc7c53ccb8ad2e93ed245028b7158f55e880b19e5cce8247ef8432590c21c90152310b63b13b1040d8fa78443078928915f49562dd599781f0a69b6db04ec8b20aec34675e9f9f8e4eb48a6ae6d05086eb1bded166139954fb16e7caa74eb2ea94ae02395547d9c63961c139a6876e882b507aba9d90b5133ea17e7ca7"}], 0x388, 0x40000}, 0x1}, {{&(0x7f00000033c0)=@llc={0x1a, 0x30a, 0x20, 0xfffffffffffff0f6, 0x7fff, 0x7ff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000003680)=[{&(0x7f0000003540)="6593cf704c821540f8ec0ac09d3446633dc992378ef9eff421c4a80a9fad9d4cbd2620b7a12f674539e278ba73a0ec68fad803ecefaee620ece450e65e3ff2c708d9837c9021a49ffdb00f48eedf2d9dd4ab964cf72fafecfaea889acd852fb564667ede4ef0fdc8229a5ccaaa1766ef749df54b927e5f1c26ed1c7b1b9016e692fbf7f677f065651b850610cb4c8627363057ecc749c2fa3362407c4e3fa470308981f76f34928bd25443b42e737dbf41a761348f3dfdbbf87380843041b8f25bdf", 0xc2}, {&(0x7f0000003640)="38ef9a03e7b3080bbdb9457ebc513fe716b73e55dd04a51f0f6190c21e90e0872e69fc91f4ec52ee95b7efa9b8", 0x2d}], 0x2, &(0x7f00000036c0), 0x0, 0x40}, 0x100000000}, {{&(0x7f0000003700)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(khazad)\x00'}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003780)="e05b4f0cc5e736d9656012124d5cae6e010529a36af76ff6b064507d2cca6b9ba3b72571e6338e8c9d5d325de963c82c8c62f36908efb60389b11868401e3608bd56bbd1128fcbe9778acbc0ffe076eeb6ed4dd4b419038275afaf200b0bc5f1b6deb09c959e8b6bf83f439fe207a32e61568b3ced725fce47c3f0250e5356ef6a748996adb169579adc503a1573949a3e87ed133ab4594012a070c4bdf639a5a174a5f30c20c4fd422e2503", 0xac}, {&(0x7f0000003d00)="fb0b5943835bfd71df0330b6d62c81ee517fa24e3194e9febf91d7f26d11ea1347172b9a95d2addbe09aabd668075ddac28e526dd1194dc52a7c307f167d1d87fcdabda27480d2ce7b1e1bd9bd4c7d6adba3cf5a33b13ece63f055352f99018f1c5367cad8381562f177f6152551efda2a16c9dacf3a0857466ea4cfe9557d713c6585635d554a9017e9ce3a5e8270e4d847ae2616db3cae3ca8559fd470e732830d7314db9478229a59c40ce100f7cc80ae53229337f1e296ba04a99e142dd06efb558c4de853c4ac22996eaae51ce91be9d5f778a5e84a62bb37", 0xdb}, {&(0x7f0000003840)="fa37a6d5c8b47c5eb58bedd32afdf5da1223a3e22c671bb10f60ef8d0ad01fb0b7e1c2406ef9d4a9708742db911f22cc435238c5b670a973d09b672b96ae16f2536f0bcd9b33", 0x46}, {&(0x7f0000003e00)="e5f6b609c758d22c701958e37821bc09de33cc62f598633ac01a3fdd9111424ad74621ec6412a1", 0x27}, {&(0x7f0000003e40)="b008311f34c27a2fafad58d67944f0eb60d31112250c1e6a451e8d25c99ce842245f25831eb6d2b3305e0dcc63a7ccded036d83b60fd27e827f6d238e5e7725e8f541a1a4cff0398575220a1e2936c658090cab7e204d8bc9811b53fa2539412de5d80d9c3cb5188fb6bd6593daf66ce85d7f68c8aa6e793fa0a81d6687fc8732521c7738177df620955f6570dad49767edd3e00675bebd414d39fb2f57d02f4fc919ac60b299e02779feafdd55100d9902f001c34b592d59e3c2adb2a76a898a1f00b8f7234dc7f821f", 0xca}], 0x5, &(0x7f0000006380)=[{0x1010, 0x29, 0xffffffffffff8000, "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"}, {0x88, 0x13a, 0x8, "0dfaf0cf25ba4db22a78299e7332f45925e62264bf1b04e612c8205f7a52a81d890dddd5e62f2fb7af11f6a7221cc4ea81c4eff060ef67385e530599090094ba854aa4d5a07d62dc5ee867f9be7644134c1712c878c5c792dff984eb72e15c637332e53a8d94f72fb4b94a2e8fa8a70f6d86"}, {0x88, 0x105, 0x1, "7dfc6a8e06df6010bd792dafd6e7435edd6aa61352bb6ec5a1a582886cad2d1d574827cce9826a6843b1c6e22ee2f8f4a9ce2b572e271b952c209646f3fe99afc3ae5c118cb593b2d46bfc5c8b008d1aaac9579d55b73070d6ea735a4fdb553af1a6c4b093ef017a86cc8ac0362676138eff"}, {0xf0, 0x13f, 0x80, "c1709175e3963f0b7747046d02eedd077ec639848c5c99dcc464144106826e0b36cc5d33e782aa94346d6267fd482f48b27b45b481107e6be39cd9c4ebbdfeb1c3ef8e31bd3e2b30e3180714ba69ccf35618c81c1ab7a14a9aee0cde14e2ac531875f1ed426d3bb40d46e5784530a71ce6e1a9653d711fe108c61ae4335a58f1bc636770c819bb373bbc6f60e926e39a6676204624c860bff1efb04187a0637c63be1d33e6171d3fe42d1492a34f45421f02c10a92fc68fcbaf933d2948c102e260f9b31adfbf9247bebd63be194c961ef0b3b9c10463482e935"}, {0x30, 0x119, 0xf, "fff7c8ec98b2d00c8fe6ac4b3317d1c7b0c6b30121d6dc051ebb"}, {0x1010, 0x13a, 0xce91, "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"}, {0xe8, 0x116, 0x80000000, "1507c7bb4bac316dad1a099366559898deb1a95ec2627c10d57408cee7dbbd79c949d052e60cae9bbe83da6c50346a3193557cf1c13ec8e498b9859868efdeaf2aeabcf2f99d206bf40e605b52e1d88744baff5cf34ce29bb113cbb433106446cbd6b164ad52a8a17bc7bded06c05af22cd0b1c6087818fe041c457c650b8560e1fa48bf52c6cc3a6df8477fa53e6a21626451ab49fce69c850f5e3e5a6e5df2ef9803ec75da264319eb415f9424f693b4b176533e1a22d6424fb34347d4651b2a4f926018d831e4034c2ed9b40f9fabad3f76ac8aa53f"}], 0x2338, 0x1}, 0x7}], 0x4, 0x1) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x1400}}], 0x2, 0x0) r2 = accept4(r0, &(0x7f00000000c0)=@ax25, &(0x7f0000000000)=0x80, 0x80800) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x440000) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0xd) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="348247566d6429862a8d412c0215e78c", 0x10) [ 547.191231] IPVS: length: 193 != 8 15:29:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x7b, 0xbff, [0xc0000101, 0x0, 0x11e]}) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0xc000) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000080)) 15:29:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x21, 0x3, 0x0, {0x1}}, 0x21) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)) 15:29:54 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfd00]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x2600, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vga_arbiter\x00', 0x500, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000880)='/dev/audio#\x00', 0xb4f1, 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x8001, 0x7, 0x1ff, 0xfff}) r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x480) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000380)=0x7fff) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x2, &(0x7f0000000080)=0x101, 0x10000025e) r5 = accept4$vsock_stream(r1, &(0x7f00000002c0), 0x10, 0x800) r6 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x200042) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xd, 0x200, 0xfff, 0xe1a, 0x11, r6, 0x40}, 0x2c) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f00000000c0)=0x4, 0x4) r7 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r8 = msgget(0x3, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0xd, 0x7, 0x2, 0xa6b1, 0x24, r6, 0x6}, 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) r10 = getegid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000600)=0xe8) r12 = getegid() ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000640)=0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r6, 0x84, 0x1c, &(0x7f0000000940), &(0x7f00000009c0)=0xfffffffffffffd50) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000008c0)=0xfffffffffffffed5) msgctl$IPC_SET(r8, 0x1, &(0x7f0000000700)={{0x20, r9, r10, r11, r12}, 0x2, 0x1, 0x3, 0x5, 0x2, 0x6b5f, r13, r14}) r15 = socket$inet6(0xa, 0x7, 0x9) bind$inet6(r15, &(0x7f0000cb8fe4)={0xa, 0x4e21, 0xfffffffffffffffd, @ipv4={[], [], @remote}, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000100)=0xffffffffffffff6f) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000001c0)={r16, 0x7fffffff}, 0x8) setsockopt$sock_int(r7, 0x1, 0x2, &(0x7f0000000180)=0x7f, 0x4) listen(r4, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000300)={r16, 0x7fffffff}, 0x8) 15:29:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000280)="eb39906d6b66732e66617600020120000200008000f8", 0x16}], 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}, {@utf8no='utf8=0'}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f00000002c0)={0x78, 0x0, 0x8, {0x1, 0x2, 0x0, {0x1, 0x9, 0x6f5, 0x6, 0x4, 0x5, 0xe79, 0x4, 0x63bf, 0x7, 0x0, r1, r2, 0x4ce, 0xfffffffffffffff8}}}, 0x78) [ 547.529779] IPVS: length: 193 != 8 15:29:54 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x9f08000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 547.554511] IPVS: ftp: loaded support on port[0] = 21 [ 547.606466] IPVS: length: 193 != 8 15:29:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) r1 = getpgrp(0x0) syz_open_procfs(r1, &(0x7f0000000140)="e12d83ae72660300000000000000195aaa686f6d6d00") 15:29:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = accept4(r0, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80, 0x800) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x9, 0x1) sendto$inet6(r0, &(0x7f0000000240)="d7", 0x1, 0x40, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) [ 547.687052] FAT-fs (loop1): bogus number of reserved sectors [ 547.714709] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:55 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x2]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:55 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfd00]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 547.893519] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 548.011042] IPVS: ftp: loaded support on port[0] = 21 [ 548.097906] IPVS: length: 193 != 8 [ 548.107015] IPVS: length: 193 != 8 [ 548.218091] IPVS: length: 193 != 8 15:29:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x566}, 0xfffffffffffffff3) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000300)) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x1}}, 0x44801) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r0, 0x0, 0xd, &(0x7f0000000340)='/dev/binder#\x00'}, 0x30) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000200)={{0x1, 0x3, 0x1, 0x1, 0x100000000}, 0x4fdf, 0x2}) write$P9_ROPEN(r2, &(0x7f0000000440)={0x18, 0x71, 0x1, {{0x2, 0x3, 0x5}, 0x9}}, 0x18) syz_open_pts(0xffffffffffffffff, 0xc00) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x100) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty, [0x0, 0x3e8]}, 0x0) 15:29:56 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x8b07000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6tnl0\x00', 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) 15:29:56 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000140)={'\nilter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0), 0x0, [{}]}, 0x88) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000200)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendfile(r3, r4, &(0x7f0000000000), 0x2) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000080)={0x11, 0x2, 0x5}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x8, 0x2) 15:29:56 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x200000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)="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", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) [ 549.271551] FAT-fs (loop1): bogus number of reserved sectors [ 549.302089] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:56 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x2) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000001440)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/247, 0xf7}, {&(0x7f0000000180)=""/115, 0x73}, {&(0x7f0000000200)=""/116, 0x74}, {&(0x7f0000000280)=""/15, 0xf}, {&(0x7f00000002c0)=""/194, 0xc2}], 0x5, &(0x7f0000000440)=""/4096, 0x1000, 0x1}, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000014c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001700)={'team0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001800)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001900)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000001940)=0x14) recvmmsg(r0, &(0x7f0000006d40)=[{{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1, &(0x7f0000002a80)=""/142, 0x8e, 0x401}, 0x9}, {{&(0x7f0000002b40)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004140)=[{&(0x7f0000002bc0)=""/138, 0x8a}, {&(0x7f0000002c80)=""/252, 0xfc}, {&(0x7f0000002d80)=""/204, 0xcc}, {&(0x7f0000002e80)=""/12, 0xc}, {&(0x7f0000002ec0)=""/157, 0x9d}, {&(0x7f0000002f80)=""/4096, 0x1000}, {&(0x7f0000003f80)=""/253, 0xfd}, {&(0x7f0000004080)=""/177, 0xb1}], 0x8, &(0x7f00000041c0)=""/227, 0xe3}, 0xaa}, {{&(0x7f00000042c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000006840)=[{&(0x7f0000004340)=""/132, 0x84}, {&(0x7f0000004400)=""/53, 0x35}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/123, 0x7b}, {&(0x7f00000054c0)=""/206, 0xce}, {&(0x7f00000055c0)=""/4096, 0x1000}, {&(0x7f00000065c0)=""/141, 0x8d}, {&(0x7f0000006680)=""/121, 0x79}, {&(0x7f0000006700)=""/116, 0x74}, {&(0x7f0000006780)=""/132, 0x84}], 0xa, &(0x7f0000006900)=""/184, 0xb8, 0x10001}, 0x94a}, {{0x0, 0x0, &(0x7f0000006b80)=[{&(0x7f00000069c0)=""/15, 0xf}, {&(0x7f0000006a00)=""/214, 0xd6}, {&(0x7f0000006b00)}, {&(0x7f0000006b40)=""/35, 0x23}], 0x4, 0x0, 0x0, 0x9}, 0x1}, {{&(0x7f0000006bc0)=@l2, 0x80, &(0x7f0000006cc0)=[{&(0x7f0000006c40)=""/116, 0x74}], 0x1, &(0x7f0000006d00)=""/45, 0x2d, 0x3}, 0x8}], 0x5, 0x2103, &(0x7f0000006e80)={0x0, 0x989680}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007040)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000007140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000007400)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000007500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007540)={'team0\x00', 0x0}) accept$packet(0xffffffffffffff9c, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000075c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009180)={'team_slave_1\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000091c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000092c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009300)={'ip6gre0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009400)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000009640)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000009700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009740)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000009840)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f000000a000)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009fc0)={&(0x7f0000007600)=ANY=[@ANYBLOB="04070000", @ANYRES16=r2, @ANYBLOB="18002bbd7000fddbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r4, @ANYBLOB="e401020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004009800000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000400080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004002c00000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400cc0000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400030000000800070000000000400001002400010071756575655f6964000000000000f5ffffffffffffff0000000000000000000008000300030000000800040007000000080006001efcac664705d1672be16528741b377c641457e00b2f5ccd8c74b8d823ccd48715cb395df398d0057fd81b2a6f1397ea466e1615b809dd24a79985bcca2a0532f3", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="5c02020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004008d00000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400018000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000008000100", @ANYRES32=r10, @ANYBLOB="c40002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040003000000080007000000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000008000100", @ANYRES32=r12, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000008000100", @ANYRES32=r13, @ANYBLOB="400002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="fc00020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r16, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000600", @ANYRES32=r17, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ff7f000008000600", @ANYRES32=r18, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r19], 0x704}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$sock_void(r0, 0x29, 0x7, 0x506000, 0x300) [ 549.362952] IPVS: length: 193 != 8 15:29:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c00", 0x5e, 0x1) setxattr$security_smack_entry(&(0x7f00000001c0)='\x00', &(0x7f0000000200)='security.SMACK64MMAP\x00', &(0x7f0000000240)="ed6b657972696e676e6f64657600", 0xe, 0x2) 15:29:56 executing program 2: clock_gettime(0x0, &(0x7f0000000040)) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) tee(r0, r0, 0xd3c2, 0xb) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000007c0)={0x2, &(0x7f0000000780)=[{}, {}]}) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000100)) r1 = add_key(&(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="233d90927126201c224a6713ef6dcbf9fb68762d71903f269bda9402ffb3ec6bcaa38656fa70a87b9317b6f9d64ce16b79583790e6623ffb49ac5e8e71c27cf6575fc1a572f412cf3120c1a88e489fe1f97c2bf8d06f2721c7", 0x59, 0xfffffffffffffffa) r2 = add_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f00000004c0)="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", 0xfd, 0xfffffffffffffffa) r3 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)="53f5099a4207ae79d291db3cc01b4b274601c38580", 0x15, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000640)={r1, r2, r3}, &(0x7f0000000680)=""/128, 0x80, &(0x7f0000000740)={&(0x7f0000000700)={'rmd256-generic\x00'}}) clone(0x2006001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000080)) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000200)={0x2, 0x938}, 0x2) fchmod(r0, 0x80) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x284240, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r4, &(0x7f0000000240)={0x30002000}) [ 549.407009] IPVS: length: 193 != 8 15:29:56 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x8000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 549.587871] IPVS: ftp: loaded support on port[0] = 21 15:29:56 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22}}}, 0x88) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x402001, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x4, 0x1, [0x200]}, &(0x7f0000000180)=0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r3, 0x1}, 0x8) mknod(&(0x7f0000000040)='./file0/file0\x00', 0x8100, 0x10001) ioctl(r1, 0x200000008912, &(0x7f0000000600)="153f6234488dd25d766070") r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000000280)=""/7, 0x18) [ 549.689259] IPVS: length: 193 != 8 15:29:57 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x1b06000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 549.749188] IPVS: length: 193 != 8 [ 549.926095] FAT-fs (loop1): bogus number of reserved sectors [ 549.948663] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:57 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f00000002c0)="d480cb6b472bf5fb3273af31264428ec6b318d48c7067c5cb66cd0724c006015cb3d5afa9923a0f6e9a50a83b7400a4deb9eae9f1ade59560369971a33c5e04ff4c51cfea35aca76418ba4b372339e98f86094ab1a304ba8261b2103d0849265d0856ff0cc0621fbe75c00a4bb8b5bb6ab33e71fcfa956b2e1341e12174f391d34955659384a8c6d80f8b4240e09253bbcc3d6f7753029f0ca9e5010757ef82cbb4ab81820855a1cc0e2bf7fa76580fb426a020056d55e2a6da220e34199419dc6f8a4ef6374e97c61e24ebabf3b94a7b30738d178beabf7") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000540)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000d800000007ef58eca0f3721fdbf47432629649fadd5f5662a99a94be50db619e275386965021712899e78c8e60a6dc5158bb3c7519d7f89ba8a80fe0cf10d6be8b481f697e336c269ff82aa24c95060d7a79fb171ebc58bcdb4b0ada62c90837cb71ae7e24258a32042ce48ba8ade7a21cdf18d09211326b0ee764db8fecfb50e6273b5d71a845ca39892bc5f32d8aa106619473dd9c42c618c224bccf90ce2105105397cf09d0455e4c227c8c8fc016ddc0cc6d6de1c25f7d5af131b5f14312ee12f844e5b865a18ebbb55f0a64a517cea7debe96dd0c2ceb2bc71b79bf506a9d864421109416b5645660a68e04565633882a098c0885000000000000000000000000"], &(0x7f0000000500)=0xfc) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000003c0)={0x1, "f4"}, 0x2) ioctl$FICLONE(r0, 0x40049409, r1) 15:29:57 executing program 3: r0 = socket(0x20000000000000a, 0x80004, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a3, &(0x7f0000000140)={'team_slave_0\x00', 0xfffffffffffffffe}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) 15:29:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x40000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:57 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x140) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) socketpair(0x2, 0x0, 0x7, &(0x7f00000001c0)) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000000)=0x3, &(0x7f00000000c0)=0x2) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x2761, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000180)={0x0, 0xb3fc}) 15:29:57 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xbf050000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 550.351206] IPVS: length: 193 != 8 15:29:57 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x1) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000006c0)=""/4096, &(0x7f00000002c0)=0x1000) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000300)=0x1000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000540), 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x37ce, 0x5}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x8001, 0x37}, 0x90) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000680)) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000698000)=0xe) syz_emit_ethernet(0x3f, &(0x7f0000000240)={@dev={[], 0x1e}, @random="b2e65d615b9e", [], {@llc_tr={0x11, {@snap={0x1, 0x1, '\a', "142f13", 0xaafd, "1ffd26fe5baadec2ec27d99173bd0eda716fc1fd5700f928625b2ee3a1ad7d106897c52d271b7613dc"}}}}}, &(0x7f0000000280)={0x1, 0x3, [0xc62, 0xf75, 0x1be, 0xf55]}) close(r2) 15:29:57 executing program 4: time(&(0x7f0000000040)) 15:29:57 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x19, &(0x7f0000000040), &(0x7f0000000000)=0x1) close(0xffffffffffffffff) [ 550.412939] FAT-fs (loop1): bogus number of reserved sectors [ 550.435937] IPVS: length: 193 != 8 [ 550.445841] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:57 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x8]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x3f) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x2, {{0x1, 0x3, 0x8}, 0xfa3}}, 0x18) preadv(r1, &(0x7f0000000480), 0x10000000000000f9, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200040, 0x0) getsockname$inet6(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) 15:29:57 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) 15:29:58 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) execveat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000080)='vmnet0\x00', &(0x7f0000000100)='selinuxwlan1\x00', &(0x7f0000000140)='}*\x00', &(0x7f0000000180)='.\x00', &(0x7f0000000480)='\x00', &(0x7f0000000200)='ppp1vmnet0em0eth0lo&mime_typebdev.[%vboxnet0\x00', &(0x7f0000000240)='\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)=',vmnet1eth1@\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)=')\'+\x00', &(0x7f00000004c0)='vmnet0\x00'], 0x1000) r3 = socket(0x10, 0x2, 0x0) inotify_init1(0x80000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 15:29:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000008f000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mincore(&(0x7f000007e000/0x14000)=nil, 0x14000, &(0x7f00000003c0)=""/213) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 15:29:58 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x3b030000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 550.782831] IPVS: length: 193 != 8 15:29:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000100)="0f08defab800008ee036decc66b8004000000f23c00f21f86635020000000f23f8b800008ee8650ff11a0f34baf80c66b850c2a98b66efbafc0cb0e3eef30f856200", 0x42}], 0x1, 0x0, &(0x7f0000000280), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000840)={[0x0, 0x0, 0x3ff]}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 15:29:58 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, &(0x7f0000b65000)) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x2828, &(0x7f00000017c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) r0 = syz_open_dev$audion(&(0x7f0000001580)='/dev/audio#\x00', 0x10000, 0x4440) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x2, @multicast1, 0x7f, 0x1, 'none\x00', 0x0, 0x7fffffff, 0x26}, 0x2c) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x1) bind$unix(r0, &(0x7f00000015c0)=@file={0x0, './file0/file0\x00'}, 0x6e) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x6, 0x0) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x6, &(0x7f00000002c0)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@aname={'aname'}}, {@version_9p2000='version=9p2000'}], [{@smackfsroot={'smackfsroot', 0x3d, ',eth1'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic'}}]}}) [ 550.844932] ptrace attach of "/root/syz-executor2"[20893] was attempted by "/root/syz-executor2"[23130] [ 550.854666] IPVS: length: 193 != 8 15:29:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x3f000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 550.958836] FAT-fs (loop1): bogus number of reserved sectors [ 550.999671] kauditd_printk_skb: 7 callbacks suppressed [ 550.999693] audit: type=1804 audit(1539617398.272:784): pid=23148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/367/file0/bus" dev="ramfs" ino=74818 res=1 [ 551.037533] 9pnet: p9_fd_create_tcp (23149): problem connecting socket to 127.0.0.1 15:29:58 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x7}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x4, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) ftruncate(r2, 0x8200) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 15:29:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0xa0000) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000480)={@mcast2, 0x0}, &(0x7f00000004c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x10, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @exit, @ldst={0x0, 0x3, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x20, 0x4, 0x5, 0x2, 0xfffffffffffffff0, 0xffffffffffffffff}]}, &(0x7f0000000280)='syzkaller\x00', 0x86, 0xc1, &(0x7f00000002c0)=""/193, 0x0, 0x1, [], r3, 0xf}, 0x48) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="d0f961339065c2a1883b655d5e2f799c", 0x10, 0x0, &(0x7f0000000440), 0x145) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff], 0x10000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000600)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f00000005c0), 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000580)=0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x20400, 0x80) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r5, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e23, 0x98d8, @remote, 0x1}, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0x14}, 0x1f}, 0x30d0, [0x3, 0x2, 0x7fffffff, 0x0, 0x37e9, 0x100, 0xd1, 0xfff]}, 0x5c) [ 551.049838] FAT-fs (loop1): Can't find a valid FAT filesystem [ 551.103856] audit: type=1804 audit(1539617398.351:785): pid=23153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/367/file0/bus" dev="ramfs" ino=74818 res=1 [ 551.159232] IPVS: length: 193 != 8 [ 551.189214] 9pnet: p9_fd_create_tcp (23167): problem connecting socket to 127.0.0.1 [ 551.213143] IPVS: length: 193 != 8 15:29:58 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x10b6) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x40000, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x200000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000440)=0x100000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, &(0x7f0000000040), 0x10000000000443) writev(r5, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r5, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r5, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) [ 551.253712] audit: type=1804 audit(1539617398.460:786): pid=23163 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/367/file0/bus" dev="ramfs" ino=74818 res=1 15:29:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f0000000700)) process_vm_readv(0x0, &(0x7f0000001100), 0x0, &(0x7f0000001340)=[{&(0x7f0000001140)=""/204, 0xb2}, {&(0x7f0000001240)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x200) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000080)=""/13) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 15:29:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x1c02000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:58 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xebb, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:29:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0xffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x7a, 0xfffffffffffffffe, &(0x7f0000000040)=0xffffffffffffffc5) 15:29:58 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000300)=0x19, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x1, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000240)={0x8001, 0x4, 0x7, 0xffff, 0x100000000, 0x41, 0x5}) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000280)={'erspan0\x00', {0x2, 0x4e24}}) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mlockall(0xfc) getsockopt$inet_dccp_buf(r1, 0x21, 0xce, &(0x7f0000000080)=""/236, &(0x7f0000000180)=0xec) unshare(0x40000000) [ 551.538124] FAT-fs (loop1): bogus number of reserved sectors [ 551.548301] IPVS: length: 193 != 8 [ 551.556523] FAT-fs (loop1): Can't find a valid FAT filesystem 15:29:58 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) accept$inet6(r0, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0000e1f0a3a7ccac0c9a03d3dc4f7ace703d36ce652ae083aa2be2fa4de8aeef8bf0c6718a279dc3957a40f902a3b6230aa84415fc49f72a0f47773f5efcf6885045174a"], 0x2) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 551.606163] audit: type=1804 audit(1539617398.887:787): pid=23199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/368/file0/bus" dev="ramfs" ino=74008 res=1 [ 551.637456] IPVS: length: 193 != 8 15:29:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xecbd, 0x101001) ioctl$TCSBRKP(r2, 0x5425, 0x3f) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x64081, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x4e23, 0xfffffffffffffffd, @local, 0x1a9}}, 0x1, 0x3ff, 0x4b638916, "b13b85cec89e3d7bcde7e0f56eb49217380d0b12e700eee92da69ad6fe53938cfae372f858b614f632e01f07536f0d0995d412b5ca378f510338e5031c072fbe99b8a5711dc036c720a42daa80bba9cb"}, 0xd8) write$tun(r3, &(0x7f0000000340)={@val={0x0, 0xc}, @void, @llc={@llc={0x6, 0x0, ')', "81fbd1b5ca7d9d1d49b08f7adb5cc9fa1353d2554a757772d5f5391183406b706824b34e2eb456e384b1503172e43a4057e56d439d8a552b947d59d99e21aca81a8b1955260eb291b8d0039c1a591f9e07516ae1e8ad26599338e68719c5a177e769e1ca1473012c4238145a2b00a5b8846ba615c5fcf47c"}}}, 0x7f) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)={0x4}) r4 = socket$inet(0x10, 0x1, 0x6) sendmsg(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000140)="240000005e0007031dfffd946f610500000000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r5 = fcntl$dupfd(r0, 0x406, r3) epoll_wait(r5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3ff) [ 551.702509] audit: type=1804 audit(1539617398.976:788): pid=23199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/368/file0/bus" dev="ramfs" ino=74008 res=1 15:29:59 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfdffffff00000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 551.794994] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 551.819887] audit: type=1804 audit(1539617399.035:789): pid=23211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/368/file0/bus" dev="ramfs" ino=74008 res=1 15:29:59 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x1c02000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000b8fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000240), 0x80800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) connect$netlink(r2, &(0x7f00000001c0)=@unspec, 0xc) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000020000000000000000000000000000000000000000000000000000e400000000000000000000000000000000000000000000010000000000000000000000"], 0x40) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xad03, 0x400, 0xa0fb, 0x10001, 0x0, 0x3f, 0x8400, 0x6, 0x5, 0x2, 0x2, 0x0, 0x0, 0x5, 0x80, 0x37e, 0x6, 0x2, 0xaa, 0x2, 0x7, 0x2, 0x2, 0x9, 0x67, 0xfa, 0x6, 0x400, 0x9745, 0x101, 0x800, 0x7cd, 0x7, 0x1, 0x959, 0xd3e, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x2004, 0x0, 0x73f, 0x7, 0x6, 0xaba}, r4, 0x10, r0, 0xa) recvmmsg(r3, &(0x7f0000007180)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/17, 0x11}], 0x1, &(0x7f0000001400)}}], 0x1, 0x0, &(0x7f0000007400)={0x0, 0x1c9c380}) [ 551.960741] IPVS: length: 193 != 8 [ 551.965259] IPVS: ftp: loaded support on port[0] = 21 15:29:59 executing program 2: capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000100)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000200)={r1, 0x7ff, 0x800, 0x1f, 0x0, 0x6, 0x7fffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x102d}, 0x48) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000)=0x8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad, 0x0, 0x2}, [@ldst={0x7}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 15:29:59 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x730f0000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 552.010096] IPVS: length: 193 != 8 15:29:59 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f620080870200000000") r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0xcd, 0x10000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xffffff46) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000500)={0x0, @aes256}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e053d", @ANYRESHEX=r0, @ANYBLOB=',uname=/dev/bus/usb/00#/00#\x00,version=9p2000.L,dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',appraise_type=imasig,smackfsroot=/dev/bus/usb/00#/00#\x00,fowner>', @ANYRESDEC=r3, @ANYBLOB=',smackfsfloor=/dev/bus/usb/00#/00#\x00,euid<', @ANYRESDEC=r4, @ANYBLOB="2c736d61636b6673726f6f743d75736572e46b657972696e672740626465762e6370757365745e7b6367726f7570757365726e6f6465762d707070302c00"]) r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) accept$packet(r5, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r5, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0xa1, 0x720066, 0xffffffff7ff0bdbe}) 15:29:59 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x4000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:29:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0xfffffffffffffee5) shutdown(r0, 0x1) r1 = socket$inet(0x2, 0x6, 0xffffffffffffffff) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000040)={'security\x00', 0x4a, "98c80e920d77eedfe2aecc708a1a710c8d07cdd5107c89d133f33839ed8f42bb8100e3ec25467c86b9e09cba633a6090b512b1b889cf46b6455ec072df8fb655972017ede08392e8b3f0"}, &(0x7f00000000c0)=0x6e) [ 552.315681] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. 15:29:59 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @remote, 0x1000}}, 0xfffffffffffffeff, 0x4}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x1, 0x7f}, 0x8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x4) r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x28, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b6218000c6300df08630040", @ANYRES64=0x0, @ANYBLOB="000000000000000003630840", @ANYRES64=0x0], 0x1, 0x0, &(0x7f00000003c0)='T'}) fchmod(r0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000f4d)}) [ 552.378209] vhci_hcd: invalid port number 181 [ 552.414736] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 552.439387] IPVS: length: 193 != 8 [ 552.464746] vhci_hcd: default hub control req: 0000 v801a i00b5 l0 [ 552.535134] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 552.537057] IPVS: ftp: loaded support on port[0] = 21 [ 552.548683] binder: 23262:23263 unknown command 1597963 [ 552.561437] IPVS: length: 193 != 8 [ 552.565327] vhci_hcd: invalid port number 181 [ 552.585148] binder: 23262:23263 ioctl c0306201 20000400 returned -22 [ 552.587791] vhci_hcd: default hub control req: 0000 v801a i00b5 l0 [ 552.608692] binder: 23262:23273 unknown command 1597963 [ 552.621173] binder: 23262:23273 ioctl c0306201 20000400 returned -22 [ 552.719061] IPVS: length: 193 != 8 15:30:01 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000300)=0x19, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x1, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000240)={0x8001, 0x4, 0x7, 0xffff, 0x100000000, 0x41, 0x5}) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000280)={'erspan0\x00', {0x2, 0x4e24}}) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mlockall(0xfc) getsockopt$inet_dccp_buf(r1, 0x21, 0xce, &(0x7f0000000080)=""/236, &(0x7f0000000180)=0xec) unshare(0x40000000) 15:30:01 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000600)="be7ca3b1d405c1368e2296f06801e264f0458bf1aa3729b767220f1609988df5c1b91435954568a2b7557a53fd604e5ababe94d34f5ba880c6fbadba63b27798858b64e6093dbc8aa5f1a05e6574f734e8f999cec1865723fa755b3ba8b7228b31617fe3e52c9878c016c5769882bc5331c5116216c1ccda497d4f921ce935c8e0f8a36fe95f6482830bab2fac5b245412583f4656e6c18f19c2d82fe5773854aefaa91c82df788bc9e4d38c8cbbcea174ba960fdc1ad65ee0bda3a433f970ebe61fafddc27958") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000500)={'veth0_to_bridge\x00', 0xbf}) 15:30:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f620080870200000000") r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0xcd, 0x10000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xffffff46) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000500)={0x0, @aes256}) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e053d", @ANYRESHEX=r0, @ANYBLOB=',uname=/dev/bus/usb/00#/00#\x00,version=9p2000.L,dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',appraise_type=imasig,smackfsroot=/dev/bus/usb/00#/00#\x00,fowner>', @ANYRESDEC=r3, @ANYBLOB=',smackfsfloor=/dev/bus/usb/00#/00#\x00,euid<', @ANYRESDEC=r4, @ANYBLOB="2c736d61636b6673726f6f743d75736572e46b657972696e672740626465762e6370757365745e7b6367726f7570757365726e6f6465762d707070302c00"]) r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) accept$packet(r5, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r5, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0xa1, 0x720066, 0xffffffff7ff0bdbe}) 15:30:01 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0xfffffffd]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:01 executing program 4: r0 = socket(0x3, 0x5, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000000c0), 0x2) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) fchown(r1, r3, r4) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000240)) r5 = accept$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x1c) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r2}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000380)={0x0, 0x1}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400)={r7, 0x1, 0x7f}, &(0x7f0000000440)=0x8) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000480), 0x4) r8 = syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x2, 0x8000) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000500)={r5, r6}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xb) r9 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="0f24bb5e0777572be86daaf3b2d44cbbcbbc1ed8a3543245b9df6a13668d17f849f88220e1a134919d8f7dad2c7d8f5cc340a8955a096ee8869d1e2d5c3660a98e24e6ce18dec0978c51c02d936c97d44a80f49689ab541fb711cc543d3910f5bf6a8898ad49befb326d396a36238996a5845eabeccd452a9bfd356245deeb36bdf30476789d0f0b7e79fe7b69ae4db4e0ab7865048fd5b9c2d00a1fe7e79d4a2205b2b8b3b373622ae7c717c80647dfe7db4ecf38603db2e8563720e46cb1707a745142f3fa1d6027858e88ec76039b5bb2ffce6946fe0be0b9070ff24ad00e9ee707f83a9e0822d615fba798", 0xed, 0xfffffffffffffffa) keyctl$set_timeout(0xf, r9, 0x81) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000006c0)={0x8001, 0x1ff, 0x4}) write$P9_RSETATTR(r2, &(0x7f0000000740)={0x7, 0x1b, 0x2}, 0x7) getsockopt$EBT_SO_GET_INIT_ENTRIES(r6, 0x0, 0x83, &(0x7f00000008c0)={'broute\x00', 0x0, 0x4, 0xfd, [], 0x2, &(0x7f0000000780)=[{}, {}], &(0x7f00000007c0)=""/253}, &(0x7f0000000940)=0x78) mq_getsetattr(r1, &(0x7f0000000980)={0x7cc, 0x5, 0xfffffffffffffffd, 0x915, 0x5523000000000000, 0x20, 0x8b3f}, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000009c0)) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000ac0)={@loopback, 0x0}, &(0x7f0000000b00)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000b40)={r10, 0x1, 0x6, @broadcast}, 0x10) sendto$unix(r6, &(0x7f0000000b80)="7c71396594706d98e49608bad55dbd2803e913882566493e3e13abc627d184a4c41698db503207a42f339626a056fd910ff1d38da5d2f1a123a81fe14390c2664350e4fe79fd4a27e8d463302961775bb4ce28e171fab53cbfa9742d9a8bee3725a8f7d441f04f478c7fa80367f3d724b040a2953bdfa4c220ebec006ab35baf8e3e9b432e0fcc2f79fcb22445512999111595e46d3a74d9b5410334286978b1070cb387e6b6336e770ae3a899465e0b2ea48e4e", 0xb4, 0x20000010, &(0x7f0000000c40)=@file={0x1, './file0\x00'}, 0x6e) syz_read_part_table(0x0, 0x6, &(0x7f0000001140)=[{&(0x7f0000000cc0)="9d56f5ff4ecf309120cabc9b371f2e2f8c20327ad6f4aa5f87d8056cf077ab7f5b2b9fd203e6de964e68847ba9314c46e89265328f441bc786abf04fc8d0e8261f561e4ecc447780447c4bbc671df6456dbeb3f449e755c5f8a0db9b81310ec9264f56122db08c9b77abe40672987a9531800f04a0023ca39c44b9f9995d46280319a5be0edbad31a713ef37374e81dc95c0384a55ed9108baf0d7b67d161e0551a1ae45e97e", 0xa6, 0x4}, {&(0x7f0000000d80)="92e8732f2dd0ef1d802edf89ac36b0fbe9def3599e1208ba1b461953ac7fa191e70d61b2a77502777cf84b40bb402e6a7e019d313d99b3027c6094b272e3aaa02347ee121303edd97724a33642843870d8cb15aa4e8baa1abf73804c9f342328713ed240b9bbde17a4e1a8c551e9a394fd5e100b1ffae2f6fd31d26e0f81f771d979658da62caff4bab1d10531dca2ea831ba50727d165b3f74138671594cd23b0720caee53ab75cd4ce9bb881077d1d517f7c7bb23262bfbc3970d76019", 0xbe, 0x80000001}, {&(0x7f0000000e40)="42754914757aef11c3e3c74b2a59f06d39cb3fc58e3854d62e4d1a725e8ace222f474141a114acd4cd3f09573a52e93b336975b76f032f15c929dc46d6d546725b815a8f62f1cfe56c55b989ca2cbee0e1f00dd4b17b4d5a581bca21831c0455589e1abf179dd46775f51736c229022ad1a05d6a45f5f700d7deab9c282074bf5bfa50a18402ba6f294927aee1ea37b42e7c0c6082da05a4245dd835c905fd19e8b503a18f18cfae20db9683236a52cdf3ad894ee23a2a9ee49731867984d101eeaa851788a17ef902558212acebb25a53830950", 0xd4, 0xff}, {&(0x7f0000000f40)="d93465a36e703313702d165940560f63a4e589878d66ef66751d3f9d4b800c9dae2d08566a1cc049ddcd0a525571dee68ecddbbb210b977df9f598431029afde8f8c7fb15593c5717e881ca716733ac87cd89b66a6c886bdecd114f2c4857615ee463223882e6e574a9fb147d8f202952de87322e71dd13b46f7427ee6eaea09d9315fe31d94aa186b74e7b89f44ce3b29da123106cfc1d207d50bb6f7d1acf7fa74581763a8175b1cac7516f6e4fd3ed7655e3d9b2a", 0xb6, 0x5}, {&(0x7f0000001000)="bc56dcb2da55345c5b960cb98b008d025032", 0x12, 0x5}, {&(0x7f0000001040)="564e0fba61952d3c492b996dca4aebf8c9092368941de63563c41337d47d4f3e388a6c4c1e1c49439425b0d98cd278263f93922d79bf141b5c7241844e2416efbcd348945588981296c81f82fd2e68352b404f18b23cfb5c8b2b97902405883c8ad0cbd43ee3cbbbfe85123dc1956cf211c95a9cdf1c5eb530d7aff43f77f38dfadb054cabcc1923221f0334356f35428108c56aee6572410029475006ef5df906ce712449a2c992e2fc6c022be86cfc924b2a58bb2645321444fa476a2a22e322e26c41a335d311a258094b0a5a72", 0xcf, 0x2}]) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000001200), &(0x7f0000001240)=0x4) 15:30:01 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x5709, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 553.930288] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 553.939030] FAT-fs (loop1): bogus number of reserved sectors [ 553.962332] vhci_hcd: invalid port number 181 [ 553.988743] vhci_hcd: default hub control req: 0000 v801a i00b5 l0 [ 553.996932] FAT-fs (loop1): Can't find a valid FAT filesystem [ 554.011113] IPVS: length: 193 != 8 [ 554.045481] audit: type=1804 audit(1539617401.296:790): pid=23293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/370/file0/bus" dev="ramfs" ino=75043 res=1 15:30:01 executing program 2: r0 = socket$packet(0x11, 0x48, 0x300) sendto(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000280)=@in6={0xa, 0x4305, 0x7, @loopback}, 0x80) [ 554.157829] IPVS: length: 193 != 8 [ 554.163990] IPVS: ftp: loaded support on port[0] = 21 [ 554.254072] audit: type=1804 audit(1539617401.386:791): pid=23285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/370/file0/bus" dev="ramfs" ino=75043 res=1 15:30:01 executing program 4: timerfd_create(0x1, 0x80000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000840)=0xca090ec11641a85b) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x2c9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote, [0x3f000000, 0x700, 0x500000002000000, 0x0, 0x40000]}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="480000000000000014010000010000000000000000000080", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="8903080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000010000000000000000"], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000116b344700000000000000000000000000000000000000cecef0c33a44db766743f7257f5d640708ded8a91a983651d69849e4616f5b6c0427b87fd5a3f7b4311e1b36011bed75aab7b717656aeefd4a6e82d60ffc997fce8b9fc42c4ec4d693"], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="db00000000000000"], @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00`\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000640), &(0x7f0000000800)=0x60) 15:30:01 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfffffffd]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32], 0x4b) readv(r0, &(0x7f0000001280)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000040)=""/221, 0xdd}, {&(0x7f0000000140)=""/218, 0xda}], 0x3) readv(r0, &(0x7f0000000100), 0x0) [ 554.439488] audit: type=1804 audit(1539617401.495:792): pid=23296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/370/file0/bus" dev="ramfs" ino=75043 res=1 15:30:01 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xfb080000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x14, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000000c0)}, 0xfffffffffffffe41) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x208000, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) [ 554.577988] sg_write: data in/out 65499/33 bytes for SCSI command 0x0-- guessing data in; [ 554.577988] program syz-executor2 not setting count and/or reply_len properly [ 554.644799] IPVS: length: 193 != 8 [ 554.724217] FAT-fs (loop1): bogus number of reserved sectors [ 554.755868] IPVS: length: 193 != 8 [ 554.756056] FAT-fs (loop1): Can't find a valid FAT filesystem [ 554.807437] audit: type=1804 audit(1539617402.050:793): pid=23342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/371/file0/bus" dev="sda1" ino=16550 res=1 [ 554.891508] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value 15:30:02 executing program 4: r0 = inotify_init1(0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000300)={r4, 0x3, &(0x7f0000000200)=[0x80000000, 0xff, 0x6], &(0x7f0000000240)=[0x5], 0x2, 0xa, 0xfffffffffffffffb, &(0x7f0000000280)=[0x2, 0x2, 0x101, 0x5, 0x6, 0x3f, 0x4, 0x3, 0x0, 0x3], &(0x7f00000002c0)=[0xd, 0x4, 0x3ff, 0xc2, 0x10001]}) ptrace(0x4207, r2) r5 = dup(r0) ioctl$EVIOCGPHYS(r5, 0x80404507, &(0x7f0000000000)=""/189) ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000001c0)={&(0x7f0000000340)=""/4096, 0x121a}) 15:30:02 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x8]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x46000, 0x0) getsockname$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000002240)={0x1, [0x0]}, &(0x7f0000003a40)=0x8) unshare(0x24020400) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000240)=0x84) 15:30:02 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000600)="be7ca3b1d405c1368e2296f06801e264f0458bf1aa3729b767220f1609988df5c1b91435954568a2b7557a53fd604e5ababe94d34f5ba880c6fbadba63b27798858b64e6093dbc8aa5f1a05e6574f734e8f999cec1865723fa755b3ba8b7228b31617fe3e52c9878c016c5769882bc5331c5116216c1ccda497d4f921ce935c8e0f8a36fe95f6482830bab2fac5b245412583f4656e6c18f19c2d82fe5773854aefaa91c82df788bc9e4d38c8cbbcea174ba960fdc1ad65ee0bda3a433f970ebe61fafddc27958") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000500)={'veth0_to_bridge\x00', 0xbf}) [ 555.049376] IPVS: length: 193 != 8 15:30:02 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x0, 0x8, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) lsetxattr$security_ima(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "1eae1ffbf57b9d20849a4bcc140ed30f4cbff9b1"}, 0x15, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380), &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000940)={r1, 0xff, 0x5, 0x5, 0xffff, 0x4}, &(0x7f0000000600)=0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x7fff, 0xddc, 0x7ff}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x28) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1}, 0x8) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r4, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x200000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 15:30:02 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x72f, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 555.115427] IPVS: length: 193 != 8 15:30:02 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x100000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 555.204109] rpcbind: RPC call returned error 22 15:30:02 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x0, 0x8, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) lsetxattr$security_ima(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "1eae1ffbf57b9d20849a4bcc140ed30f4cbff9b1"}, 0x15, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380), &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000940)={r1, 0xff, 0x5, 0x5, 0xffff, 0x4}, &(0x7f0000000600)=0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x7fff, 0xddc, 0x7ff}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x28) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1}, 0x8) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r4, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x200000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 555.240383] FAT-fs (loop1): bogus number of reserved sectors [ 555.251778] FAT-fs (loop1): Can't find a valid FAT filesystem [ 555.345532] sg_write: data in/out 65499/33 bytes for SCSI command 0x0-- guessing data in; [ 555.345532] program syz-executor2 not setting count and/or reply_len properly [ 555.396751] IPVS: length: 193 != 8 [ 555.451357] IPVS: length: 193 != 8 15:30:02 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x0, 0x8, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) lsetxattr$security_ima(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "1eae1ffbf57b9d20849a4bcc140ed30f4cbff9b1"}, 0x15, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380), &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000940)={r1, 0xff, 0x5, 0x5, 0xffff, 0x4}, &(0x7f0000000600)=0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x7fff, 0xddc, 0x7ff}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x28) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1}, 0x8) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r4, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x200000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 555.473664] rpcbind: RPC call returned error 22 15:30:02 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x1c020000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:02 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x0, 0x8, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) lsetxattr$security_ima(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "1eae1ffbf57b9d20849a4bcc140ed30f4cbff9b1"}, 0x15, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380), &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000940)={r1, 0xff, 0x5, 0x5, 0xffff, 0x4}, &(0x7f0000000600)=0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x7fff, 0xddc, 0x7ff}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x28) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1}, 0x8) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r4, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x200000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 15:30:02 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x930c000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 555.707106] rpcbind: RPC call returned error 22 15:30:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x0, 0x8, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) lsetxattr$security_ima(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "1eae1ffbf57b9d20849a4bcc140ed30f4cbff9b1"}, 0x15, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x0, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x0, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380), &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000940)={r1, 0xff, 0x5, 0x5, 0xffff, 0x4}, &(0x7f0000000600)=0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x7fff, 0xddc, 0x7ff}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x28) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x0, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1}, 0x8) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r4, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000240)='./file1\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x200000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 15:30:03 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000600)="be7ca3b1d405c1368e2296f06801e264f0458bf1aa3729b767220f1609988df5c1b91435954568a2b7557a53fd604e5ababe94d34f5ba880c6fbadba63b27798858b64e6093dbc8aa5f1a05e6574f734e8f999cec1865723fa755b3ba8b7228b31617fe3e52c9878c016c5769882bc5331c5116216c1ccda497d4f921ce935c8e0f8a36fe95f6482830bab2fac5b245412583f4656e6c18f19c2d82fe5773854aefaa91c82df788bc9e4d38c8cbbcea174ba960fdc1ad65ee0bda3a433f970ebe61fafddc27958") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000500)={'veth0_to_bridge\x00', 0xbf}) [ 555.740702] IPVS: length: 193 != 8 [ 555.744503] FAT-fs (loop1): bogus number of reserved sectors [ 555.775540] FAT-fs (loop1): Can't find a valid FAT filesystem [ 555.804498] IPVS: length: 193 != 8 15:30:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x9) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xcb1a, 0x80000) setsockopt$llc_int(r2, 0x10c, 0x0, &(0x7f0000000040)=0x800, 0x4) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 15:30:03 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfd]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 555.966633] rpcbind: RPC call returned error 22 [ 556.060071] IPVS: length: 193 != 8 15:30:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x7ff, 0x80000001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8936, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x264, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x8]}, 0x75, r3}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r3}) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) name_to_handle_at(r4, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x20, 0x7f, "cc483303cf2cd5e54a2a20bd62fa42bd4ddeeb3f3c2d4d3a"}, &(0x7f0000000640), 0x400) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a1, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r3}) r6 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="6c80dee22064ecc2e1a0f2bc4df55a7f4ee9b0d78c9e3fb08476e7c97b207cc059cb1ff0c49f962332426fa0b1501af6d8dfeb908d5536ea067a5659b04086344f5d2f19", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xb) r7 = semget(0x3, 0x0, 0x2e2) semtimedop(r7, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r8 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r8, 0x80045300, &(0x7f0000000000)={0x0, 0x0, 0x20}) setsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000440)=@int=0x8, 0x4) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x3, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$nbd(r8, &(0x7f0000000680)=ANY=[@ANYBLOB="67446698010000000200030001000000780850bbf145962d6db8c3e44c8238f3186579c72d7fd4ece5444956c37bea26c85951d961fe7566784c032ec94e540de64778de8f860efc19b364401a081e0ebc6e64e53f9ebad5376c203529fe73edfb1573bf75e2a6fe8006cd12d2b9d0afd5557c830511691a7e1d4c72e25f2affba68ae94396997212f7df0d6e7e58eebdd5b2e8edacc143c6af38785a37349a35c7e21a24fe40a31dde617ced0ff9d982419c589ff0b6fbee57c97c553ab409b2d4586e7ca164174615536887f0155ee3557ece3c48c402d12afd2f2c733b1b99fc8d1074643c093af6378a8c5c4308e0138a1b846a340"], 0x1) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000002c40)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x5ffc, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="c8c3822642625609b35166ff86bece4e45ba6e005099e00c82bdac3b201a408072834a9bbed1b4a4e84e0d066b072850e40603039b89d9074cb408aa9e52279ed93cbd8582417995a1ca953b93d0efcc01dc97feffed33aa51ab2919cf77737c30201fa2d8c34f498f8b3da940010c474919ca49da47085eb42c36ff67aa1c0c02cef0f5fafc1f6f59b35f0e59016ffcac91f68dae5fa3cc0248fc776124e52125c11bc7282eab83fd9dbc4763e52e94a2bc634e7f29e1c73d153af853d8", 0xbe, 0x8}], 0x20000, &(0x7f0000000200)=ANY=[]) connect$inet(r4, &(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x5) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x111000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r9, 0x84, 0x13, &(0x7f0000000280)=0x5, 0x4) [ 556.097078] IPVS: length: 193 != 8 15:30:03 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x9f080000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000400)={0x0, 0xff}, 0x8) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x4020940d, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 556.218105] FAT-fs (loop1): bogus number of reserved sectors [ 556.247649] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:03 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x2]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 556.280567] kauditd_printk_skb: 6 callbacks suppressed [ 556.280582] audit: type=1804 audit(1539617403.518:800): pid=23454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/374/file0/bus" dev="ramfs" ino=74392 res=1 15:30:03 executing program 2: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) process_vm_readv(r0, &(0x7f0000000040)=[{&(0x7f0000000440)=""/244, 0xf4}], 0x1, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/130, 0x82}], 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) tkill(r0, 0x1a) getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xa, 0x8, 0x2, 0xf}, 0xa) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x5}, 0x8) rt_sigaction(0x2b, &(0x7f0000000380)={&(0x7f00000001c0)="c4e3ed0f17f4c4a17a5b6e026566400fe2f2c4e1f9d63ff30f116423afc401d5d90e36430fde2dde00000065f04383b49cd9c5000099430f01c4c4e27d1a420a", {0xaa}, 0x40000001, &(0x7f0000000200)="660f0d5f8cc4a2f598d4660f144b0466f23e41c0e6302e64470f16eef2430f2c413264650f1dca2e660fc442df7c642642a7660f5d11"}, &(0x7f0000000540)={&(0x7f00000003c0)="0f1a2e660f380a3fc442610336410f6b9e065f16f42642d96d4c664d0f3a6172100065420f71d3fec422752bf63643ae400fc2c191", {}, 0x0, &(0x7f0000000400)="c4e2650b7c470cc4021d021d0b000000f3416cf2df1d00000000f33e44c0ef00c402a19e19440f381e523ac421782eeac4627932612766400ff9f8"}, 0x8, &(0x7f0000000580)) r3 = msgget(0x1, 0x20) r4 = getuid() r5 = getegid() getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) setxattr$security_evm(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='security.evm\x00', &(0x7f0000000840)=@sha1={0x1, "066f5a91c4b20f154b88a72466895102251c5b25"}, 0x15, 0x2) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000740)={{0x7fffffff, r4, r5, r6, r7, 0x4, 0x4185}, 0x1ff, 0x10000, 0x1, 0x0, 0x100, 0x1, r0, r0}) [ 556.465432] audit: type=1804 audit(1539617403.647:801): pid=23454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/374/file0/bus" dev="ramfs" ino=74392 res=1 15:30:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x4, @mcast2, 0xe08}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e24, 0x2, @remote, 0x7ff}, @in6={0xa, 0x4e24, 0xfffffffffffffffc, @loopback, 0xffffffff}, @in6={0xa, 0x4e22, 0x5569, @loopback, 0x3}], 0x90) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0xfffffffffffffffe, &(0x7f00000000c0)=0x158) [ 556.589732] IPVS: length: 193 != 8 15:30:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) syncfs(r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) signalfd(r0, &(0x7f0000000000), 0x8) sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x4068aea3, 0x0) [ 556.675542] IPVS: length: 193 != 8 15:30:03 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x2, 0x4) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) acct(&(0x7f0000000000)='./file0\x00') 15:30:03 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x2000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 556.729565] audit: type=1804 audit(1539617403.835:802): pid=23454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/374/file0/bus" dev="ramfs" ino=74392 res=1 15:30:04 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000600)="be7ca3b1d405c1368e2296f06801e264f0458bf1aa3729b767220f1609988df5c1b91435954568a2b7557a53fd604e5ababe94d34f5ba880c6fbadba63b27798858b64e6093dbc8aa5f1a05e6574f734e8f999cec1865723fa755b3ba8b7228b31617fe3e52c9878c016c5769882bc5331c5116216c1ccda497d4f921ce935c8e0f8a36fe95f6482830bab2fac5b245412583f4656e6c18f19c2d82fe5773854aefaa91c82df788bc9e4d38c8cbbcea174ba960fdc1ad65ee0bda3a433f970ebe61fafddc27958") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000500)={'veth0_to_bridge\x00', 0xbf}) 15:30:04 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x4000000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:04 executing program 3: [ 556.849458] FAT-fs (loop1): bogus number of reserved sectors [ 556.871220] FAT-fs (loop1): Can't find a valid FAT filesystem [ 556.928670] audit: type=1804 audit(1539617404.152:803): pid=23500 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/375/file0/bus" dev="ramfs" ino=74494 res=1 15:30:04 executing program 2: ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x188) ioctl$TIOCCONS(r0, 0x541d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x14, 0x4, 0x4000000004, 0x58, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0xf000000, 0x1300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x2c) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000004a00)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)="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", 0x1000}], 0x1, &(0x7f0000000080), 0x0, 0x10}, {0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001cc0)="1d6edd5dd3359b0af7575c239f6ff02202b7d9d790129088956fbcab10a53a557aa2fc02cbac93f80d0afc580605d173baff40290830f8be9eb60a54ff1a2080f41eb7f595a1efdcd6ac387fd1e26394728a5e87191546ca9430a1dadd6d09aa9b4be0369dc141685022f0762e89f95ca44301ecf9a7b7d8889e52b0e09bbfacf49c7cff73780ab1c3c335d6943f1062e43b444549cf66", 0x97}], 0x1, &(0x7f0000001e40), 0x0, 0x1}, {0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f00000038c0)}], 0x1, &(0x7f0000004940), 0x0, 0x6a1b33cdca0a40bb}], 0x3, 0x0) [ 557.013826] IPVS: length: 193 != 8 [ 557.036623] audit: type=1804 audit(1539617404.212:804): pid=23497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/375/file0/bus" dev="ramfs" ino=74494 res=1 15:30:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8911, &(0x7f0000000280)="153f6234488dd25d766070") r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000600)) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="776fde14726b6469723d2e"]) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000100)=0x3301c, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) sendfile(r1, r3, &(0x7f0000d83ff8)=0x2400, 0x8000fffffffe) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0) [ 557.091164] IPVS: length: 193 != 8 15:30:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000400)={0x0, 0xff}, 0x8) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x4020940d, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:30:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000001d000), 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) sendto(r0, &(0x7f0000000080)="b1cdc59caf84584fcad68dd05b4aef4cb742eb326694cc38bc02f0193b2db1401d894060cfec8f727d6f28e95bf3f74de9375f563952dc99979095f6cc5b6aeee3c04d6c8defa06ed841c2c50e5fb6e01d81fd5c45747adc4baf5f997c616cc81bf999d9969fdc85ab5a99d5f00e5bcd70d1f96bd83c679168bab4d9d53c6016275293a3d96bd711941391fc8a4ebf8289167caf38002e290a30366515fa3e48027cd3afcfad01031ef01b2084f153b497540a053e7e357a1d4ae9c89aa7c85cfa07338d6c98d03472ec1a27f054d7760427253ba1e5e24d02e7143551e792f997c689e6b17f9de32ee6bd1452d29a5e3223479da530f45d87eb8e62bbc66616cb8cc2e536280863ab6bc65b5cbe4c0e55998d38e7b4cc6e01fe63f0cc99cf84890b0fa787e6cf06cc8c18e523aa4479c29638de82bd4d7a8cc8132b49b2e9182a9d2e1e57ae9fe47d55e91725f2205fe285645a64a26802b0807c42fcbc352e30f52f9aa023aea3a99d5fd5bef53b8862c6219860fc46d8b51a02124d676b8e21e29f750e4c23f2e903fbab5fad02af3a80851ddd5beac60781b84f8b902f3f24ff38996b1400fd20c2234a0656f8f21d47d4cf7264c6d063e73bc5f2f6d66926fa32a5159e944f248eb294b7108cc206740dc0bfc0edf08c342af5ca2a8b8d31143f8b186ee11c29e7d6f35ecb29184bd7c677faef2a2714cd7f738700437dfe0778678061a17e83db2194d116582ac8daa20e6ede4d6fecfd6eec77b7e41cd4b7ec137edf30ad7f2332288a78b7ca9814eb0f1e45f32fab0f747322b362d122e817833015828b310a240ae0e6c0e344e432b7ab8b81fc8c6c76d6f377c6d12da82114debdf233d83e50d88dec09ed711c28962e6c5c6ba699b69b0370365911a326f185ef6ec448de035d0545b554c58138d8c7ebe5ba837ef9c707ca9ce66f87ec130d7ecac308ca47c6ae41714dc0225c7e0de6f14cad805b9fac721f14ebb7206a6f4ee9712bfdbd2bd34dc4463a1f650ae17d30fd09d96787d01727b4159a17e62c97d181031e31b5438aac14a3adc3788b4797eb4d604cebed9d142c951f869524fcf348182fed0465dab5dbd1090db6e5b6dcbec86da3bc3c9a725232fb670fa73e12c05b06245e404f2ee843f9f38ef8612c3395935983101d724f9122fb9c8fbc2821156923c745bd1295f56986bdb325720977bf6ddfd047fd8b7007ca68dfb4ee2d6752c7d2943f861b6bbae108c9ab2cf3313c2f1d725c7092f880c3b07dfe7228f8bf7eda4547e9f8f04a81a9aed369fb8d5c094d10ee5ddff1f49f908767d062106c961fba28297e6bd4e251b675807b43850d4382e470a142f0bcfca1bc899aea0d561a95e8fb81da0d4f8066b6279f8c2d0f0a933edbe628d994745604701a000585c634d2c661349bb8f542165dd803bb6dbc4572c9d113db472f8c8c45b8ae70aa5242e68f327369eef9faebcd563053f5e0fa3b44dbd503ae23557906014d7b015accc85c79c73fbc27cf942e9ef486fcef89cbdc60fd83850cfcd97e551a6b87b74f3a36be275899f58cb9e33def94ddaac7893a119d6dd0061f54a3f6e598543ff52871c565131639462c23db2ad53e3f8a785c5ad257cd5fe8fa59ab166464ba96292709a7e490e2f5712d1e376c32a18da8190be007cdb2be305e9a05b166ea34d0d2a2c324ab4b1b08635ccf8642899680f956278ce8c10ea8a859ba945d9a2f8bd2e2be6b87ea68fd272f33a1a8598acb410d2401fed470d57b6f7e8f8b14504893a16761b25c603cbff399facd8c90d1b936e921afc5730cd966a34a811cfeb6bf8af3705954157dd8f238091057c561fa7be994d35e47e45df853ed7fc82dbf817efa3b0e90a186770fdbb402d171f47c7113df25e8bfa01632bc253b3f7936df800dc1fb105393c5cbb6675775546466cbddaeedbef17f02fb6cdc9942857c640c1aab24b6bcfb136b63885490d9687ba4c1cd22bd7759ed7fe24f347f8eb861a054c6e5c5c0142dee3f6fe875d70879b92ba2811f9e1e9342885a34785fa03d0e7466c581d7313ad65a72913731315b43aa8e8c8aff0a36caaf9658d7c91d9b64100895b26c3a9bda95e9b2cff7a01eca62821b05e9da2620efb27beda073c33158a6aaada8dad008cb88dd9c03ad27859506f139c3309ecf602f1988b5ba4f240acb72653af4871debb08e04006f58027bb06cfb119e17c3ff8e24a53fc1e3d58838153a146e84e92662f8120709a5aa588fb0659511a07815607b37a43855b10ccbd467fe1d7919ed29e280b24308f35c55f0889c984c733b60b9995be496da34cca7e8aabed6324f61bd947ec9583910c9cf792fc2fc61e765e3215935e143e37df5f251a6f7e105de3ebd4a6b185e23d9d2e29e3e6a485ac62737b00ec7a011c4980ed8825b82d76505fb0199b1db7c456de4d67a281f6fafb18760a3f6c156c0c7d3b723e561a0edd6e34f25776ebcdd687dacc5e5b23ffaa348f91fa9c6aff264117616f95d8d21540996b97fa439265869dd0775d6ba3272116dd54feba941520d42268c6d55a2b9b009ae1077b0f38c810ee34e41b1484bbd8fd351166e029bd4f939ce4b64a7e8af7080ce07d6870d850f8fdd0278b277485a9aab0d0c0bec10a154053973e3ed0b085d6e3ed2bc904773d8831c646e45e13672cefc63b6a90505758b857d4bb77ffb555f7f6e082aeecc07b72920ce2aea53004853751e597000a7d2d715ea375515d6a7f5220865b49268d9b407401eb8f42aeb26201fea2576640920afb23b7c9c17d9a44eff83898dda7ec85f70a88a7865a6cc86a0fb29dfeae68ca8c4408af0db47b88f797d3f2da4a2c7b0d46c659cb1c6cc34a2a32891dab4242227707b5173d8d46830120330095981b8c199b3a9d4c8f40bfea7309b18ddd0484c69a443c919f97936cc511778f13b04ae7a82cea413218046a5f9bbaabee32b6318425dae9eb3988a0884af1f59bdfddf95882234b227ae8135b560e098a98a564f7af681204014fe44af40402465698c6ba2c65882780a4521cb3cfbf56ecdf27246508e7549acd0b1bba41d398b14a1f0f740de2ae8b783423e5d50f0dd8b18e031f3f9aba0e22583ee82a01fe8389021db8d6b88b4c0f67064d20c81c6ddeac0d0fcfc1d487b10a787bec2d74580694b966032f10e70f6e72d48630dcd2a1c042653d09fb696551a2becdc4bcdf18ce599c0d11f2a35856bcfe62486a7a6ef92b7d0b410e9a606844267fb220feb495f20891813e999013eeb858c8b30e6bdbc9b4d5baf453978e27eabc4374c7ffad4c9473a8b6fba400a8474fcd99129da92caa84513d0ffe8c352bfa15cfddeceac116207744da6fc9b7e9ba87ce6df52e82c42a2d8ec4d06eb12bcd5b653dbfd67bc50466dc982660b86d6cdae7908223d7451d7d0326b97c62faf8a3da6b718af0219a1a4e34c48a4aaf473689d33fc5061780fe60170c50952ce3b53699003613bcc9f06b7abcf35254387da92cb259c2a39fbaa5b70503ee43d5528e53523cbf643caf981fe2516adfd4a47549138e847ecbfb160169be4b434008d2d9c540657279b2315d4efc61ad2bfb461b728e1fb7068c641339b39fe37bfd88ee7c4a787e1bcdb3009902cfaa6711bd2c126c5fb3763bd62e81c8bccc60354eaa08f483500f32736e535a2c2689150e010bf85c4a58ef21ae83780372916c48a6696402e7b6f124872a211542c73c67e254e4afd843adbdd7eb8ffcc87f42a35a7790592000b96e3ebf537862b99a5ff9f44a1aa856940e6ff4eb722ffc809b22883a50b1965f85078119082d96d6d680acf5b0db1b7553d6d54cd54ca4e31667dc98573952a369482a57a693266e4ddbfdf7e57bcecdf1ab5f07f766567ed431f37c76383bb74b4a0921c7adf32c4f5d8a86a1c85b914a551b0e0bbca36d55bf5812f292517a769e359d9410425dd19467c85fa50d23c063a58de48bbf1a8ecf2d9046f67f81c8738a3ff0c0ab985b678a895a484ff055640b017ebbc7db69c3b0dbd252d29722e58d04ad330d3d17e07a4b69c05a0a9bd8b00608e9fb45f416cf6594595c4b9279f5407665cafbe6a79f84e11e28b58b84ff6e478504f83b1c8846fd416982475debda48558132411f3641453edaf50d05bcd73e24a62e625f9730de8e411d9fa2709d22c1fd95a338dba4d4e512d35f7383c634f23366b4c36b6e0bd142605fc3a09d368fd463411b866f5c8156d17849b6db8373fe9b9bfda279bce9d2ab56280c177554313e1f6665cac183a54eedf4b67c1cb051cd97b0e88aa84be2a9c60eef65ad52f33d3085746e3a7390b18182fedaca87c578f6e1ca7b75199568ae8d5707e22d0958374128f043d6a11538cd777873c61339fbbda449fd96e7d80037c575d143504d147d52454a9e5df8988c93d847fd4bd016dd20efbdd3729b57ead511a334e531517694df1caad5c05ecc2d9523e25353da52f21802fcebebc61497bf18aea6c2245d88d7fa637d4fb0d926a8a6a89acfec4a03b99154614e63605fd90dc749a43f6e57f37b377d62bc232a741fb43e463c0cacde8c8bd6475a79a4a9190c3eab4909b81b465f7f00483b43ad55b5d277cdc8abef8f5d3ab510279d2f4e3d1e5e859047cd22138dd10b5b038e3761e4dc60a790b68c67d32a567f1dce99b397384e44a69955c3c14670ab5bb4a2423609a50d2ddb978d270a09bbda956de0f61354e4d9afe743e79713fd954e7e48abed9a2abd9f288f9dec6f41ef4f2676f25287763446124928223d2b35d12284b0a5fc7c9044e7ac18d496de2a37f88a4b2d747ea58084cb07430f0d78c9ad524f64008f16ebc58c2cae33e90c2e55cf8abebb64ec5c5042fd315fc126166ae07a0085e5295b3adcfaa0253dddc3dba3d5a2b056956d79fb5f0d27137668c2f91d4dcafec3ec4cd7730fecb16390e9dab014fdcb918dfcb54161cc59e7ec2e1df479b7c140a55cbfe1c66e34058c02d6e81386f409e11e5a5247bacd0edb53f46b70ae2cd1265b63212d838bf8365034f788054c4c75abaf4b32adda3542c0dd1a4bfbb9a2b26aa824110a2148823476b587253b6c7a5cfe6e9f43b0975e196c8c9211076e8699c9ef3dbf20050aa2af86bb43fff58f22cdde8be125be0bff78449a137ff0ec81f4e2ee311c80e33415c1e13b70dadac8886daa5785a8e4bfbe03320f3eea1aaa2a33a5d056156ae6a6ba86a5297f6ac276a1657bbb518ff478f9766c6faed9e3381afd7915470769cb2d9e8dd83a73f988c5932cc91615b12783ec8fd1365340fc96b6f80c35199db83a7eb46fdde08722a7d1dc1a5687833d2e9a77efd3948ad89107766409008ac4d018c730a94b18d9ff929f84dcac349da6d46d8abdab358fa8b5b81aa60ca29da89aeef6104c5dc8d5ed40adf007ea8e7b2384a22ad8f171e6a5bc42734e4eff786355a3d4f911e9b86c5c5dce9e3806fe834fc11afbc787b37ec6e0dfe59b27bb122258c480aa27aafa98c2be4c7c878be752e4b681f705f8250b0ef457cf86a092deca0956a0533b63998cc133356a2f66fe594c7257ef826766222b16d5a5d15826d8eed16e81c1479365a483a3828444b162c897ea506310b76afa77f6f6db80eca0a5b1130b6a4828aef6699c1a612a1b2e2d1210026d5c6156f10ea00c44f86b2561cb1e484f95b470c5e27bed1c3afdcb4ba37cb3d0dbbad838bc570dfbe9ff543c23d77819e0d8ac7a73e104d565fde09bd418037a24c06d58b8500a40573b02f837a6948cdfd92", 0x1000, 0x4, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xffffffffffffff80}, 0x10) listen(r0, 0x7) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000001080)=0xcea, 0x4) accept(r0, 0x0, &(0x7f0000000000)) [ 557.208459] overlayfs: unrecognized mount option "workdir=." or missing value [ 557.224735] audit: type=1804 audit(1539617404.291:805): pid=23510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/375/file0/bus" dev="ramfs" ino=74494 res=1 15:30:04 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x400000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:04 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xcf0f0000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 557.342445] audit: type=1804 audit(1539617404.490:806): pid=23525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir636164738/syzkaller.eX79Q4/713/bus" dev="sda1" ino=16581 res=1 [ 557.414833] FAT-fs (loop1): bogus number of reserved sectors [ 557.450805] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:04 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getrandom(&(0x7f0000000180)=""/4096, 0x1000, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x7, 0x48, 0x4, 0xe3e}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@nat={'nat\x00', 0x1b, 0x5, 0x4e8, 0x3bc, 0xec, 0x3bc, 0x288, 0x0, 0x4c4, 0x4c4, 0x4c4, 0x4c4, 0x4c4, 0x5, &(0x7f0000000140), {[{{@ipv6={@empty, @mcast2, [], [], 'yam0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0xf0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@mcast1, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6, @ipv4=@rand_addr, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) [ 557.479303] IPVS: length: 193 != 8 [ 557.497557] audit: type=1804 audit(1539617404.728:807): pid=23548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/376/file0/bus" dev="ramfs" ino=75418 res=1 [ 557.561408] IPVS: length: 193 != 8 [ 557.664088] audit: type=1804 audit(1539617404.837:808): pid=23552 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/376/file0/bus" dev="ramfs" ino=75418 res=1 15:30:05 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfd000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000002c0)=ANY=[@ANYRES32=r0], 0xffffffffffffff2a) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100), 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x3f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @multicast1}}}, 0x84) close(r2) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x7f}, &(0x7f0000000240)=0x8) [ 557.845407] audit: type=1804 audit(1539617404.986:809): pid=23552 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/376/file0/bus" dev="ramfs" ino=75418 res=1 [ 557.986450] IPVS: length: 193 != 8 15:30:05 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000600)="be7ca3b1d405c1368e2296f06801e264f0458bf1aa3729b767220f1609988df5c1b91435954568a2b7557a53fd604e5ababe94d34f5ba880c6fbadba63b27798858b64e6093dbc8aa5f1a05e6574f734e8f999cec1865723fa755b3ba8b7228b31617fe3e52c9878c016c5769882bc5331c5116216c1ccda497d4f921ce935c8e0f8a36fe95f6482830bab2fac5b245412583f4656e6c18f19c2d82fe5773854aefaa91c82df788bc9e4d38c8cbbcea174ba960fdc1ad65ee0bda3a433f970ebe61fafddc27958") 15:30:05 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xbf05, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:05 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000007140), 0x10) [ 558.056195] IPVS: length: 193 != 8 15:30:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000400)={0x0, 0xff}, 0x8) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x4020940d, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 558.080755] overlayfs: unrecognized mount option "workdir=." or missing value [ 558.119125] FAT-fs (loop1): bogus number of reserved sectors 15:30:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='attr/current\x00') sendfile(r0, r1, &(0x7f0000000040), 0x8001) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x80, 0x100, 0x4, 0x0, 0x0, [], [], [], 0x8001, 0x5}) 15:30:05 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x21c]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0xc0000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r3) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)) [ 558.180409] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:05 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f0014f9f40700090400020007fc07000100ffffffff0800000000000000", 0x24) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x80000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) [ 558.313302] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 558.341069] IPVS: length: 193 != 8 [ 558.422230] IPVS: length: 193 != 8 15:30:05 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x200000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000002c0)={"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"}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='bridge0\x00') 15:30:05 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xdf02, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 558.701095] IPVS: length: 193 != 8 15:30:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0), &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) rmdir(&(0x7f0000000240)='./file0//ile0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in=@loopback, 0x4e22, 0x0, 0x4e22, 0xe000000000000000, 0x0, 0x80, 0x80, 0xff, 0x0, r1}, {0xa, 0x7, 0x4, 0x0, 0x9, 0x6, 0x40000000000000, 0xc1f}, {0x100000001, 0x0, 0x0, 0x8001}, 0x0, 0x6e6bbd, 0x1}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x3501, 0x2, 0x3, 0x1ff, 0x3ff, 0x0, 0x3}}, 0xe8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000200)=0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000280)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000340)={r3, r4}) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) [ 558.781531] FAT-fs (loop1): bogus number of reserved sectors [ 558.795820] IPVS: length: 193 != 8 [ 558.854497] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:06 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) 15:30:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe(&(0x7f0000000280)) ftruncate(r0, 0x7ff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)={{}, {r1, r2/1000+30000}}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 15:30:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000400)={0x0, 0xff}, 0x8) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x4020940d, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:30:06 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfdffffff00000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:06 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000004c0)=0x7f) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000600)="be7ca3b1d405c1368e2296f06801e264f0458bf1aa3729b767220f1609988df5c1b91435954568a2b7557a53fd604e5ababe94d34f5ba880c6fbadba63b27798858b64e6093dbc8aa5f1a05e6574f734e8f999cec1865723fa755b3ba8b7228b31617fe3e52c9878c016c5769882bc5331c5116216c1ccda497d4f921ce935c8e0f8a36fe95f6482830bab2fac5b245412583f4656e6c18f19c2d82fe5773854aefaa91c82df788bc9e4d38c8cbbcea174ba960fdc1ad65ee0bda3a433f970ebe61fafddc27958") [ 559.182460] IPVS: length: 193 != 8 15:30:06 executing program 3: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f0000000000)=0xffffffffffff4b6f, 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x3b, @rand_addr=0x6, 0x4e21, 0x4, 'none\x00', 0x0, 0x9, 0x6d}, 0x2c) socket(0x1b, 0xe, 0xce8) close(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x98, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x854}, 0x4000080) 15:30:06 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x1cb, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 559.259580] IPVS: length: 193 != 8 15:30:06 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfdffffff]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:06 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl(r0, 0x1, &(0x7f0000000040)="8300078681ed251e8d85260d887783800309376ce2d4e269b245382fed58bdb530b6bf1b602d3b3b5fe4679af1ff43b11c95bf6af1007abd391c9c8a218e901f4fb6f81ca11855956df05063d186c908799d0dc8") syz_emit_ethernet(0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c9084800b4eaaaaaaaaaabb000d020000e02f0100001ee4b6e374141e2a32aec217e5b30c150ab03de1a9ad0a2befdc0382e507e144d2ffde9efae58e0f63cb83c56f354465d39b11d62c904302f0474b31abfb0118"], &(0x7f0000000000)={0x0, 0x0, [0x1a9, 0x80000001]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) waitid(0x0, r1, 0x0, 0x20000009, &(0x7f0000000180)) 15:30:06 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0xd0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x3000, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r1, 0x48, 'D<%', "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"}}, 0x110) write$selinux_attr(r0, &(0x7f0000000240)='system_u:object_r:var_spool_t:s0\x00', 0x21) fcntl$setsig(r0, 0xa, 0x20) write$UHID_CREATE(r0, &(0x7f0000001280)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000280)=""/4096, 0x1000, 0xc941, 0xf372000000000000, 0x100000000, 0x1cf, 0x1f}, 0x120) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000013c0)=0x101) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000001400)="26bbe92d89a5d4092b63d4b899a1e161d58e879eb6ce066165b3376d955fd585f909146bea6a5b824db67900acd65da1e555728495d2142bb8fd79b7f0b80d3f5db28e5a989a1f5fa03e4832726cc5c63f8dd82c038f095b12902f635a48abd8f7a78e956dba418b5b529dd89fc5e62cb1b393207fe30d4eb2637ece1146185d20e824ce00aeff4e40bc5a71") ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f00000014c0)=0x4) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000001500), 0x2) getpid() ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001540)={r0}) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000001580)={0xa, 0x4, 0xfa00, {r1}}, 0xc) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f00000015c0)=""/81, 0x51) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000001640)=""/148) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000001700)={0x6, 0x118, 0xfa00, {{0x1, 0x9, "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", 0x71, 0x3, 0x4, 0x3b, 0x9, 0xca6, 0x7fff, 0x1}, r1}}, 0x120) getpeername$packet(r0, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001880)=0x14) bind$bt_hci(r0, &(0x7f00000018c0)={0x1f, r3, 0x3}, 0xc) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000001900)=0x2c) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000001940)=0x9) getsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000001980), &(0x7f00000019c0)=0x4) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000001a00)=""/29, &(0x7f0000001a40)=0x1d) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000001a80)={0x15, 0x110, 0xfa00, {r1, 0x4, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e20, 0x7f, @loopback, 0xffff}}}, 0x118) splice(r0, &(0x7f0000001bc0), r2, &(0x7f0000001c00), 0x3, 0x3) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r4) ioctl$int_in(r2, 0x5452, &(0x7f0000001c40)=0x5) r5 = msgget$private(0x0, 0x4) msgctl$MSG_INFO(r5, 0xc, &(0x7f0000001c80)=""/84) [ 559.482028] FAT-fs (loop1): bogus number of reserved sectors [ 559.524104] FAT-fs (loop1): Can't find a valid FAT filesystem [ 559.586890] IPVS: length: 193 != 8 15:30:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) r2 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x20000, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions='default_permissions'}], [{@euid_eq={'euid', 0x3d, r3}}]}}) [ 559.672159] IPVS: length: 193 != 8 15:30:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf0, 0x40030000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xf0ffff, 0xff66}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0xff8e}}, 0x0) 15:30:07 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) 15:30:07 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {r2, @in={{0x2, 0x0, @multicast2}}, 0xf0, 0x0, 0x5, 0x0, 0x8dc}}, &(0x7f0000000300)=0xb0) 15:30:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x1, 0x4) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000180)=0x3000) sendmmsg(r1, &(0x7f0000004c80)=[{{0x0, 0x18020000, &(0x7f0000004b40), 0x6c, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0x0) 15:30:07 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x4]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:07 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x7f0b, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x100}, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_lifetime={0x4, 0x4, 0x400300}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xb0}}, 0x0) [ 560.104227] FAT-fs (loop1): bogus number of reserved sectors [ 560.137081] IPVS: length: 193 != 8 [ 560.145713] FAT-fs (loop1): Can't find a valid FAT filesystem [ 560.198994] IPVS: length: 193 != 8 15:30:07 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, 0xfffffffffffffffe, 0x3e) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x3, 0x3}) 15:30:07 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfd00000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:07 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000580)=""/250, 0xfa}], 0x3, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYBLOB="b5000000ee0cd74c227ff3f7885ba14d17b5ff4f4f0aedef73a3991a56623dd3943db5a7e72c946911404ddc2bb351d3295791157b015680cbeb8b1c4dd4f5c460e14a60d944c84694c4de1f3c192c6b4d1b050338f11cc40000000003b4b3bb35b9bf74358ed3d67b8024882a1567a764b6bc87ced81043d123be95788afb5c127d6d54a7c9d50200000090b2b5871c94d565f74d708e8bc24661f78342e0215993e5396a4d10d05064283685240c4dd0dd"], &(0x7f0000000140)=0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x82000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r4, 0x14f531970742d9e5, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40040) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:30:07 executing program 3: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) connect$nfc_llcp(r0, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "074eda2e675cbabd44a3031a4db4d87ff9134940b9356a0e5e009a350b4600580db1dc3964b8ccbfaf0bc0631f7b2c7d432871805325bf95b1f8aaba19068c"}, 0x60) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000000c0)={0x2c, @local, 0x4e21, 0x1, 'lc\x00', 0x0, 0x100000000, 0x7a}, 0x2c) 15:30:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x107d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x2}, [@ldst={0x4, 0x18d1fb, 0x5, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 15:30:07 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0x8, 0x4) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 560.481801] IPVS: length: 193 != 8 [ 560.555886] IPVS: length: 193 != 8 15:30:08 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) 15:30:08 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x370c, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:08 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x40000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:08 executing program 3: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7fff) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x802) write$tun(r3, &(0x7f0000000140)={@val={0x0, 0x7}, @void, @x25={0x0, 0x1f, 0xf1, "b3fce4d40337066b5c16fc78b2bc379a3016a300959146bc26c37b667befc6b4ada70e81b2adbcf6ff115816f5ef4fb361bc97772e6966fc1f5ca0d491487b939fcda2da74006d2e3a0ccf446bf346d946fdfdde48f0748c59ddf2f0d240a22ba3a2dcb799"}}, 0x6c) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x9, 0x1, 0x20, 0x8000, 0x80000000, 0x6320, 0xfffffffffffffff9}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000200)={0x3, r3}) [ 560.874651] FAT-fs (loop1): bogus number of reserved sectors [ 560.880497] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:08 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) getgroups(0x5, &(0x7f00000005c0)=[0xee00, 0xee01, 0xee01, 0xee00, 0xee01]) [ 560.926457] IPVS: length: 193 != 8 [ 560.994903] IPVS: length: 193 != 8 15:30:08 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x1000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:08 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x4b0d, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f0000000080), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x0, 0x0, 'veth0_to_bond\x00', 'bridge_slave_1\x00', 'eql\x00', 'veth0_to_team\x00', @empty, [], @empty, [], 0xe0, 0xe0, 0x128, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @random="85f5bfff46de", [], 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x0, 0x957759eda387f255}}}]}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}]}, 0x230) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vcan0\x00', r2}) [ 561.409059] IPVS: length: 193 != 8 [ 561.426518] FAT-fs (loop1): bogus number of reserved sectors [ 561.438868] FAT-fs (loop1): Can't find a valid FAT filesystem [ 561.481321] kauditd_printk_skb: 19 callbacks suppressed [ 561.481336] audit: type=1804 audit(1539617408.675:829): pid=23810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/382/file0/bus" dev="ramfs" ino=76944 res=1 [ 561.539974] IPVS: length: 193 != 8 15:30:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x2, 0x9, 0xffffffffffffff15, &(0x7f00000002c0)="e63f0da1170d06ad7cec8bd8d530bfd813ee23cc769201792c6392326c1028ea0c9c9c27cfd0d0debf877fb7fbf2bc0dd56dda665ffda3f2ea5ae3bc86a834d5dd1f1df554c6a954d9d06fbb19a1dfe181109d3a3fa3e220ac6f23af0dfae567ceb9f58fd29ad34823da2e9d4f8bc038642e8d9677042fa62244fc55"}) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000340)=ANY=[@ANYBLOB="020d000016000000000000000000000002000a00030000000000000001000000080012000000030000000000000000000600000000000000000000000000001b6645fe6762ad1e000000000000000000ff02000000000000000000000000080105000500000000000a0000000004000000000000000000000000ffffac141400000000000000000005000600000000000a0068e2edd2c9ddea0c81420d1642000000000000fe8000000000000000000001000000ff00000000000000009844cb9b"], 0xb0}}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffc, 0x280800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000040)={{0x3, 0x9}, 'port0\x00', 0x81, 0x404, 0x2, 0x3, 0x401, 0x9, 0x7, 0x0, 0x7, 0xfffffffffffffffc}) 15:30:08 executing program 3: r0 = socket$inet6(0x10, 0x80802, 0x7f) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000100)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f000000dfaa)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891000000390009000a000500000000001900a30715000000000000dc1338d54400009b136ef75afb83de448daa7227c43ab8220000060cec4fab91d400", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x480000000, 0x20000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000180)="d9673fccaf8f301d94728a4d166c9baa3dd4d445d08bfd340de8588314f9affe66ca482b2a87b05827249676e8dc53f54a4c718f82f19351e5552465f8fc2f7cfaeabfacb0f356337cdf7b238e3052b7e79b9d531edffc097bd269c085c9a968bf83b1c6aa939a5f01b7c3e5929107bce7aa7b6bc42848722d23af0f5c1b0ecb613ae06e939172573570c734e9fcb64b6a97441c0335667c0c37e4c396a9b3c046cccb8ed5057a32ec77773f218065b6d9aecb02dda2e596aa142122479ec8a8c3b9b3c121b903a782129b33f3d59245bc2dc19e2831128ed4ef8b4b014a8a03bd838e1885ff7165466566b0e22ab09161617b4bde", &(0x7f0000000280)=""/138}, 0x18) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000040)={0x1dcf163f, 0x8, [0xff, 0x2]}) [ 561.656063] audit: type=1804 audit(1539617408.764:830): pid=23806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/382/file0/bus" dev="ramfs" ino=76944 res=1 15:30:08 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x3f000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 561.909250] IPVS: length: 193 != 8 [ 561.969274] IPVS: length: 193 != 8 15:30:09 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0x8, 0x4) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) clock_gettime(0x0, &(0x7f0000002900)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000027c0), 0x40004c3, 0x1ba, &(0x7f0000002940)={0x0, r4+10000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:30:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r0, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote, @rand_addr}, 0x6) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000033554fd3f813c4beca5452329c2404a522e9223ab640b869c9ee91302e4699f252da216ccd2a61d7549532ea166d4d4451f9852077ffcf89fb7d79f1f2559c53e7dff77f76da95f623929a"], 0x8) close(r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x401) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r4}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x200}) dup3(r0, r1, 0x0) 15:30:09 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xab04, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) write$P9_RMKNOD(r1, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x0, 0x3, 0x8}}, 0x14) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@mcast1}, &(0x7f0000000080)=0x14) 15:30:09 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() 15:30:09 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x8000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 562.271628] FAT-fs (loop1): bogus number of reserved sectors [ 562.278245] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:09 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) [ 562.308318] audit: type=1804 audit(1539617409.498:831): pid=23852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/383/file0/bus" dev="ramfs" ino=76072 res=1 [ 562.357238] IPVS: length: 193 != 8 [ 562.438774] audit: type=1804 audit(1539617409.528:832): pid=23852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/383/file0/bus" dev="ramfs" ino=76072 res=1 [ 562.470528] IPVS: length: 193 != 8 15:30:09 executing program 3: sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700305f85715070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000006c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4c8, 0x148, 0x208, 0x2c8, 0x148, 0x3c0, 0x480, 0x480, 0x480, 0x480, 0x480, 0x6, &(0x7f0000000100), {[{{@ip={@remote, @broadcast, 0xffffff00, 0xff, 'bond_slave_1\x00', 'veth1_to_team\x00', {}, {0xff}, 0x1d, 0x1}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800], 0x0, 0x0, 0x5}, {0x9, [0x30187d7c, 0x0, 0x2, 0x0, 0x10001, 0x40], 0x1f, 0x2, 0x7}}}}, {{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0x15}, 0xff, 0xffffffff, 'bcsf0\x00', 'bridge0\x00', {0xff}, {}, 0x4, 0x1, 0x40}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0x8, 0x3}}}, {{@ip={@empty, @local, 0xffffffff, 0xffffff00, 'team_slave_1\x00', 'syzkaller1\x00', {}, {0xff}, 0xaba7a3bef854b485, 0x1, 0x20}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@multicast2, @empty, 0xff, 0xffffffff, 'syzkaller1\x00', 'veth1\x00', {}, {}, 0x0, 0x3, 0x19}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x4, 0x0, [0x18, 0x21, 0x16, 0x25, 0x40, 0x19, 0x2, 0xb, 0x3e, 0x17, 0x24, 0x0, 0x12, 0x3b, 0x2f], 0x1, 0x3, 0x8}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x528) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)="6367726f7525232f634310af4f0000aba0661a08ef2c58e8eee8da0a01ce9dae1140951842b2", 0x2, 0x0) syslog(0x2, &(0x7f0000000640)=""/89, 0x59) fsetxattr(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="6f73322e6367726f752523f8ffffffffce9d000000000000000000000000000000000000000000000000"], &(0x7f00000000c0)="6367726f7525232f634310af4f0000aba0661a08ef2c58e8eee8da0a01ce9dae1140951842b2", 0x26, 0x0) 15:30:09 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x3f00]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 562.614366] audit: type=1804 audit(1539617409.627:833): pid=23852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/383/file0/bus" dev="ramfs" ino=76072 res=1 15:30:09 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x9703000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 562.862664] FAT-fs (loop1): bogus number of reserved sectors [ 562.883699] audit: type=1804 audit(1539617410.063:834): pid=23887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/384/file0/bus" dev="ramfs" ino=76133 res=1 15:30:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="5e77493b9bb9bd02000000000000000000", 0x1}], 0x1000000000000381) r1 = semget(0x2, 0x4, 0x792204a20da850d8) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000000)=""/51) [ 562.934166] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_names\x00') syz_kvm_setup_cpu$x86(r3, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xe) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e24}, 0x10) [ 562.983341] IPVS: length: 193 != 8 [ 563.070019] audit: type=1804 audit(1539617410.242:835): pid=23884 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/384/file0/bus" dev="ramfs" ino=76133 res=1 [ 563.100427] IPVS: length: 193 != 8 [ 563.223684] audit: type=1804 audit(1539617410.311:836): pid=23887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/384/file0/bus" dev="ramfs" ino=76133 res=1 15:30:10 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000080)={0xffffffffffffffa3, 0x4444bcc}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000006c0)={{0x3, 0x7, 0x8, 0x0, 'syz1\x00', 0x5}, 0x0, [0xff, 0xfffffffffffffffc, 0x8, 0x3, 0xfffffffffffff800, 0x6, 0x5, 0x10001, 0x4, 0xfffffffffffffffd, 0x7ff, 0x8, 0x8, 0x0, 0xca, 0x4, 0x8, 0x0, 0x6, 0xe595, 0x6, 0x1ff, 0xa3, 0x9, 0x8, 0x1, 0x9, 0x9, 0x5, 0x2, 0x1ff, 0x7, 0x8001, 0xe689, 0x5, 0x0, 0x5, 0x9, 0x1, 0x4, 0x0, 0x5, 0x8, 0x0, 0x6, 0xb7, 0x3, 0x7fff, 0x6e, 0x6, 0x1, 0x7, 0x3, 0xfffffffffffffff7, 0x10000, 0x3, 0x781c, 0x134e, 0x26, 0x0, 0x6, 0x510, 0xfffffffffffffff7, 0x6, 0x4, 0x4e0, 0x6, 0x1, 0xfffffffffffffffb, 0xffff, 0x1, 0x54, 0x1, 0x10000, 0x4, 0x8b, 0x6, 0x401, 0x1ff, 0x3a54, 0x80000000, 0x101, 0x9, 0x4, 0x9, 0xfffffffffffffff9, 0x9, 0x6, 0x5, 0x3, 0x4, 0x800, 0x5, 0x1, 0x7f, 0xfffffffffffffeff, 0x2a9, 0x6, 0x7, 0x80000000, 0x3, 0x2, 0x3ff, 0x0, 0x3ff, 0x7, 0x1000, 0x7, 0x7ff, 0xfff, 0x4, 0x3, 0x3, 0x79b1, 0x7, 0x81, 0x1, 0x7, 0x8c62, 0x5, 0x9, 0x8, 0x8, 0xa29b, 0x3, 0xe32, 0x66c, 0xff], {0x0, 0x989680}}) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0xfff, &(0x7f0000000100)={0x3}, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=ANY=[@ANYBLOB="3400000010000104000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000697036350565000004000200"], 0x34}}, 0x0) r2 = getpid() fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x1, 0x4, 0x10001, 0xe6, r2}) 15:30:10 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) 15:30:10 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) write$cgroup_pid(r1, &(0x7f00000003c0)=r2, 0xffffffffffffff21) getuid() 15:30:10 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x1c02000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x8, 0x400000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x23000020}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000100)=0x7) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'syz_tun\x00', 0x0}) getsockname$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000040)={@remote, r4}, 0x14) 15:30:10 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x30e, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 563.420000] IPVS: length: 193 != 8 [ 563.451236] FAT-fs (loop1): bogus number of reserved sectors [ 563.465596] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. [ 563.488224] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:10 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f00000005c0)=@file={0x0, './file2\x00'}, 0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xfffffcfb) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) recvfrom$llc(r1, &(0x7f00000004c0)=""/240, 0xf0, 0x10001, &(0x7f0000000640)={0x1a, 0x302, 0x3f, 0x9, 0x0, 0x3, @local}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+', 0x3}, 0x28, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) gettid() mount(&(0x7f0000000040), &(0x7f0000000240)='./file2\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f0000000300)) pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x7}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f0000000440)=0x84) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000040)) signalfd(r0, &(0x7f00000001c0)={0xfffd}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000740)={0x7fffffff, 0x9, 0x9, 0x76, r3}, &(0x7f0000000780)=0x10) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f00000000c0)=""/149) [ 563.507239] IPVS: length: 193 != 8 [ 563.532334] audit: type=1804 audit(1539617410.708:837): pid=23924 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/385/file0/bus" dev="ramfs" ino=76188 res=1 [ 563.563603] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. 15:30:10 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x50100a, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1d, 0x7f, 0x20, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100000000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0xeb) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6611, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000600)=0x3, 0x4) getpeername$packet(r2, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000940)={'vcan0\x00', r3}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r5 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffd, 0x400000000031, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x14, &(0x7f00000000c0)={0x2259, &(0x7f0000000040)}, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in=@rand_addr, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000440)) getgroups(0x7, &(0x7f00000003c0)=[0x0, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0xee01]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={r6, r7, r8}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0x50, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0x10d, &(0x7f00000001c0)='/dev/sequencer\x00', r9}, 0x1166c52b879c2cfe) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) sched_setaffinity(r10, 0x8, &(0x7f0000000140)=0x10001) 15:30:10 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x800000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 563.650136] audit: type=1804 audit(1539617410.757:838): pid=23918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/385/file0/bus" dev="ramfs" ino=76188 res=1 15:30:10 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10200, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x3f, @ipv4={[], [], @multicast1}, 0x5}}, 0x3c, 0x400}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r1, 0x80, 0x10}, 0xc) r2 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000009ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x4020011, r3, 0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x802) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00004edfd0)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1863e1da9122682131867849911a0000"]}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f00004ee64e)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f000000efd0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfdfd, &(0x7f00000001c0)="ef"}) 15:30:11 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x5a80, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:11 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x30e, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0xbe701000003088d}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 563.852073] binder: 23948:23949 unknown command -622763240 [ 563.877708] binder: 23948:23949 ioctl c0306201 204edfd0 returned -22 [ 563.941742] IPVS: length: 193 != 8 [ 563.961598] FAT-fs (loop4): bogus number of reserved sectors [ 563.973286] FAT-fs (loop1): bogus number of reserved sectors [ 563.988367] FAT-fs (loop4): Can't find a valid FAT filesystem [ 563.995488] FAT-fs (loop1): Can't find a valid FAT filesystem [ 564.082936] IPVS: length: 193 != 8 15:30:11 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) r2 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r2, 0x12) 15:30:11 executing program 4: socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x15}}, 0xffffffffffffff11) clone(0x2102001ff7, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="2321202e2f66696c65300affc9f5287343843c10f94690c502ad6a8102ac9cc7be8502ca3693c0932071a7ddf666d528aef2fc20fb7b9596379d92372855f000000000000000e154dc106803ebfd0913e44db3e719f8ccbed993ff2ba4333da724af2adaef694c6952f633ab1e"], 0x6d) close(r0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x2, 0x1, {0xa, 0x4e23, 0xffff, @empty, 0x5}}}, 0x32) sched_getparam(0x0, &(0x7f0000000340)) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0xff, @local, 0x4e22, 0x0, 'dh\x00', 0x6, 0x2, 0xb}, 0x2c) execve(&(0x7f0000000580)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000140)="6d23ba4d4000", &(0x7f00000001c0)='H^loN.\x00'], &(0x7f0000000540)=[&(0x7f00000003c0)='{#,@^\x00', &(0x7f0000000400)='#,eth0vmnet0eth1md5sum-$\x00', &(0x7f0000000440)='{#,@^\x00', 0xffffffffffffffff, &(0x7f0000000480)='{#,@^\x00', &(0x7f00000004c0)='[md5sum\x00', &(0x7f0000000500)='\x00']) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x100, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r1, 0xb14b, 0x20}, &(0x7f0000000300)=0xc) rt_sigsuspend(&(0x7f0000000380), 0x8) 15:30:11 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x677, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 564.571775] FAT-fs (loop1): bogus number of reserved sectors 15:30:11 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x2000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 564.617711] FAT-fs (loop1): Can't find a valid FAT filesystem [ 564.637288] binder: BINDER_SET_CONTEXT_MGR already set [ 564.649022] binder: 23948:23992 unknown command -622763240 [ 564.665698] binder_alloc: 23948: binder_alloc_buf, no vma [ 564.680530] binder: 23948:23991 ioctl 40046207 0 returned -16 [ 564.693626] binder: 23948:23992 ioctl c0306201 204edfd0 returned -22 [ 564.724467] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 564.738415] binder: release 23948:23949 transaction 22 out, still active [ 564.746470] binder: 23948:23993 transaction failed 29189/-3, size 0-0 line 2973 [ 564.759866] binder: undelivered TRANSACTION_COMPLETE [ 564.765831] binder: undelivered TRANSACTION_ERROR: 29189 [ 564.771488] binder: send failed reply for transaction 22, target dead 15:30:11 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x800000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 564.832940] IPVS: length: 193 != 8 15:30:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0xbe701000003088d}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 564.920343] IPVS: length: 193 != 8 15:30:12 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x3f00000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:12 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xf17, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 565.041760] IPVS: length: 193 != 8 15:30:12 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) gettid() [ 565.134572] FAT-fs (loop1): bogus number of reserved sectors [ 565.172244] FAT-fs (loop1): Can't find a valid FAT filesystem [ 565.260274] IPVS: length: 193 != 8 15:30:12 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x2000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:12 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x16f, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:12 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = msgget(0x0, 0x20) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000480)=""/4096) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x1, 0x20d) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde68638"], 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1e3, 0x0, &(0x7f0000001380)={0x77359400}) truncate(&(0x7f0000000400)='./bus\x00', 0x10000) getsockopt$packet_int(r0, 0x107, 0x14656e00f5a9ffd4, &(0x7f0000000100), &(0x7f0000000180)=0x4) umount2(&(0x7f0000000280)='./bus\x00', 0x8) socket$rds(0x15, 0x5, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 15:30:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) fanotify_init(0x44, 0x20000000101002) ioctl(r0, 0x8002000000009378, &(0x7f0000000100)="0100000000000000180400000001000000555d040f45426d0270ec78dfd849832f") [ 565.660307] IPVS: length: 193 != 8 [ 565.666229] FAT-fs (loop1): bogus number of reserved sectors 15:30:12 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x4000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 565.723066] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f0000000000), 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x3}, 0x28, 0x3) [ 565.847580] overlayfs: filesystem on './file0' not supported [ 565.879440] IPVS: length: 193 != 8 15:30:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x2, &(0x7f00000000c0)="15bf6234488dd25d726070") mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a55000/0x4000)=nil, 0x4000, 0x4003, &(0x7f0000000000)=0x2, 0x5, 0x2) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x11000, 0x0, &(0x7f00003e0000/0x11000)=nil) [ 565.944255] FAT-fs (loop1): Unrecognized mount option "%_^#*" or missing value [ 565.985259] IPVS: length: 193 != 8 15:30:13 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0xfd00]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:13 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x957, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 566.392258] IPVS: length: 193 != 8 [ 566.406498] FAT-fs (loop1): bogus number of reserved sectors [ 566.433918] FAT-fs (loop1): Can't find a valid FAT filesystem [ 566.536073] kauditd_printk_skb: 17 callbacks suppressed [ 566.536089] audit: type=1804 audit(1539617413.683:856): pid=24088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/390/file0/bus" dev="sda1" ino=16580 res=1 15:30:13 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) [ 566.691851] audit: type=1804 audit(1539617413.831:857): pid=24088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/390/file0/bus" dev="sda1" ino=16580 res=1 15:30:14 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x5c, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:14 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x4000, 0x0) gettid() 15:30:14 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = msgget(0x0, 0x20) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000480)=""/4096) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380)=0x1, 0x20d) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde68638"], 0x1b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ssse3\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1e3, 0x0, &(0x7f0000001380)={0x77359400}) truncate(&(0x7f0000000400)='./bus\x00', 0x10000) getsockopt$packet_int(r0, 0x107, 0x14656e00f5a9ffd4, &(0x7f0000000100), &(0x7f0000000180)=0x4) umount2(&(0x7f0000000280)='./bus\x00', 0x8) socket$rds(0x15, 0x5, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 566.943830] attempt to access beyond end of device [ 566.955792] loop2: rw=1, want=130, limit=112 [ 566.979420] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 567.034261] attempt to access beyond end of device [ 567.062619] FAT-fs (loop1): bogus number of reserved sectors [ 567.069464] loop2: rw=1, want=131, limit=112 [ 567.085578] IPVS: length: 193 != 8 [ 567.090761] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 567.101617] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x4800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x8c03) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f00000001c0)={0x9, 0x4, 0x9, 0x2}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000200)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000035000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000001d00)="ba430066ed650fc71f64660f7d9c00800fc758e0b8620c8ee02e66660f560fc17738000f323e3e2e0f00150f07", 0x2d}], 0x1, 0x0, &(0x7f0000001d40), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 567.125346] attempt to access beyond end of device [ 567.147985] loop2: rw=1, want=132, limit=112 [ 567.156153] audit: type=1804 audit(1539617414.308:858): pid=24118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/391/file0/bus" dev="ramfs" ino=76509 res=1 [ 567.164705] Buffer I/O error on dev loop2, logical block 131, lost async page write [ 567.281161] audit: type=1804 audit(1539617414.357:859): pid=24121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/391/file0/bus" dev="ramfs" ino=76509 res=1 [ 567.282823] attempt to access beyond end of device [ 567.365452] audit: type=1804 audit(1539617414.417:860): pid=24121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/391/file0/bus" dev="ramfs" ino=76509 res=1 [ 567.430087] loop2: rw=1, want=133, limit=112 15:30:14 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) 15:30:14 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x2df, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 567.456597] Buffer I/O error on dev loop2, logical block 132, lost async page write [ 567.496597] attempt to access beyond end of device [ 567.507617] loop2: rw=1, want=150, limit=112 [ 567.517741] Buffer I/O error on dev loop2, logical block 149, lost async page write [ 567.552912] attempt to access beyond end of device [ 567.579020] loop2: rw=1, want=151, limit=112 [ 567.589446] Buffer I/O error on dev loop2, logical block 150, lost async page write [ 567.609730] attempt to access beyond end of device [ 567.621051] FAT-fs (loop1): bogus number of reserved sectors [ 567.622171] audit: type=1804 audit(1539617414.764:861): pid=24137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/392/file0/bus" dev="ramfs" ino=76523 res=1 [ 567.645572] FAT-fs (loop1): Can't find a valid FAT filesystem [ 567.654497] loop2: rw=1, want=152, limit=112 [ 567.668479] Buffer I/O error on dev loop2, logical block 151, lost async page write 15:30:14 executing program 4: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, 0xffffffffffffff9c}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000100)={0x7fff, 0x200, 0xffff, 0xffffffffffffa3f6, 0x9, 0xdd25}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x101101) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f00000000c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x6017216f}, 0x1cf) 15:30:14 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) [ 567.673954] audit: type=1804 audit(1539617414.803:862): pid=24137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/392/file0/bus" dev="ramfs" ino=76523 res=1 [ 567.676555] attempt to access beyond end of device [ 567.705315] loop2: rw=1, want=153, limit=112 [ 567.711164] Buffer I/O error on dev loop2, logical block 152, lost async page write [ 567.719380] attempt to access beyond end of device [ 567.724767] loop2: rw=1, want=161, limit=112 15:30:14 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x1c02]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:15 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000140)) [ 567.836563] audit: type=1804 audit(1539617414.912:863): pid=24137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/392/file0/bus" dev="ramfs" ino=76523 res=1 15:30:15 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000000)=0x2775c86d, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000580)=""/79, 0x4f}, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1, &(0x7f0000000a00)}, 0x0) [ 568.016922] IPVS: length: 193 != 8 15:30:15 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x705000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x33f, 0x7f6, 0xff, 0x3, 0x5, @dev={[], 0x20}}, 0x10) r1 = socket(0x1e, 0x805, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x3fe) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000600)=ANY=[@ANYBLOB="050000000000000000600000000000005a00000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000007e38d796a44f097600000000af03000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="00000000000000000440000000000000f800000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000d600000000000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000050000000000000e000000000000000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x10000, 0x0, 0x3, 0xfff]}) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x240) ioctl$VT_WAITACTIVE(r3, 0x5607) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94) close(r0) poll(&(0x7f0000000180)=[{r2}, {r3, 0x20}, {r0, 0x40}], 0x3, 0x8) [ 568.118612] IPVS: length: 193 != 8 [ 568.179816] FAT-fs (loop1): bogus number of reserved sectors 15:30:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000280)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r0, @ANYPTR64, @ANYRES16=r3]) dup3(r2, r3, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) [ 568.210770] audit: type=1804 audit(1539617415.339:864): pid=24178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/393/file0/bus" dev="ramfs" ino=77362 res=1 [ 568.220634] attempt to access beyond end of device [ 568.264043] FAT-fs (loop1): Can't find a valid FAT filesystem [ 568.271036] loop2: rw=2049, want=130, limit=112 [ 568.336089] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 568.348344] audit: type=1804 audit(1539617415.418:865): pid=24181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir645971851/syzkaller.xB86rm/393/file0/bus" dev="ramfs" ino=77362 res=1 [ 568.434948] attempt to access beyond end of device [ 568.447856] loop2: rw=2049, want=131, limit=112 [ 568.468499] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 568.553343] attempt to access beyond end of device [ 568.578253] loop2: rw=2049, want=132, limit=112 [ 568.583477] attempt to access beyond end of device [ 568.599119] loop2: rw=2049, want=133, limit=112 [ 568.608233] attempt to access beyond end of device [ 568.613459] loop2: rw=2049, want=150, limit=112 15:30:15 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="04000000000000fcff000000000000000000000000000000c5199f12331dc6cd5a738f9f6a22a5714d8a1610df0f161ebe7695dc2ab8fef5339371b8c9c674844514c69ad11472ba63dd178a41adcf07169643c037013ae39f0f8c6f53338e928b60a7bae6fa8ae9bf2481a2cb89be8aa1e915b053fd077283f7239e4c092dca52fee8fb82da53d5213ee5c007ac3ce7ba9d92d28901788f517a187bee48dfe3d29760352b726db46a5dbec90607a276da74632a9856b620767647b2923e15af482367b53c502d152273f4da36e4da16ce07ace4bb428a8983c985b4e82b"]) 15:30:15 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x4000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x805, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x33f, 0x7f6, 0xff, 0x3, 0x5, @dev={[], 0x20}}, 0x10) r1 = socket(0x1e, 0x805, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x3fe) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000600)=ANY=[@ANYBLOB="050000000000000000600000000000005a00000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000007e38d796a44f097600000000af03000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="00000000000000000440000000000000f800000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000d600000000000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000050000000000000e000000000000000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x10000, 0x0, 0x3, 0xfff]}) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x240) ioctl$VT_WAITACTIVE(r3, 0x5607) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x0, 0x3ff}, 0x94) close(r0) poll(&(0x7f0000000180)=[{r2}, {r3, 0x20}, {r0, 0x40}], 0x3, 0x8) 15:30:15 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) 15:30:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x3, @broadcast}}, 0x1e) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000280)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r0, @ANYPTR64, @ANYRES16=r3]) dup3(r2, r3, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) 15:30:15 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x30e000000000000, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 568.627810] attempt to access beyond end of device [ 568.633175] loop2: rw=2049, want=151, limit=112 [ 568.639549] attempt to access beyond end of device [ 568.644793] loop2: rw=2049, want=152, limit=112 [ 568.650382] attempt to access beyond end of device [ 568.655757] loop2: rw=2049, want=153, limit=112 [ 568.707969] FAT-fs (loop1): bogus number of reserved sectors [ 568.713882] FAT-fs (loop1): Can't find a valid FAT filesystem [ 568.738574] attempt to access beyond end of device [ 568.743845] loop2: rw=1, want=265, limit=112 [ 568.778262] IPVS: length: 193 != 8 15:30:15 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0xfffffffffffffffe, 0x0) ioctl$BLKPG(r0, 0x90000915, &(0x7f0000000080)={0x0, 0x1, 0x0, &(0x7f0000000700)}) 15:30:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom$inet6(r0, &(0x7f00000000c0)=""/129, 0x81, 0x40000000, &(0x7f0000000180)={0xa, 0x4e20, 0x2, @remote, 0x9}, 0x1c) r1 = socket(0x10, 0x802, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x15, &(0x7f00000001c0)=0x401, 0x4) msgget$private(0x0, 0x610) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = getpgid(0xffffffffffffffff) sendmsg$nl_netfilter(r1, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000500"], 0x110}, 0x1, 0x0, 0x0, 0x88c0}, 0x8040) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) write(r1, &(0x7f0000000000)="240000001a0025f0006bb404feff141c020b5aff6e10b500000780cc08000200ac141410", 0x24) r3 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x80000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x22000, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000240)) [ 568.809654] IPVS: length: 193 != 8 15:30:16 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0xfffffffd]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:16 executing program 3: socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) flock(r0, 0x0) r1 = socket$inet(0x2, 0x80000, 0xfffffffffffffffe) pipe(&(0x7f0000000340)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) getitimer(0x2, &(0x7f00000001c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000400)="6e65742f74637000cd5771e92a073467075e90b6e46b4832802f88b6bbeb60b84023837448aea4791d5c5d9393b565d9d4b8412320c82a73d0673e16ab4d7f6f4bec1766b97811bfab16c5cb94ff1ca001b3491cb9ccbbbe9cd02113e1bc2efa473385e02c") sendfile(r1, r2, &(0x7f0000000080)=0x4c000000, 0x80000003) 15:30:16 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) [ 569.026757] IPVS: length: 193 != 8 15:30:16 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xe5f, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 569.083150] IPVS: length: 193 != 8 [ 569.246724] FAT-fs (loop1): bogus number of reserved sectors [ 569.278602] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:16 executing program 2: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8, &(0x7f0000002b40)=""/8, 0x40f00}, 0x48) 15:30:16 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x26) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000000), 0xfec4, 0x4008000, &(0x7f0000001000)={0x2, 0x4e22, @broadcast}, 0xfffffffffffffe1e) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000580)=[0x0, 0x5]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000300)=0xfffffffd) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x30000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000480)="0047f82f07d82c99240970") madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000940)=""/193, &(0x7f0000000180)=0xc1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000440)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r6, 0xe, r2, 0x2) fcntl$dupfd(r4, 0x406, r3) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) r7 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x3, 0x41}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x5, 0x4) 15:30:16 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0x21c]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:16 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 15:30:16 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x3b03, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 569.611141] IPVS: length: 193 != 8 15:30:16 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) [ 569.646835] IPVS: length: 193 != 8 [ 569.659919] FAT-fs (loop1): bogus number of reserved sectors 15:30:16 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0x1c02000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) [ 569.712413] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:16 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 569.870745] IPVS: length: 193 != 8 15:30:17 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000002a80)=ANY=[]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c80)={0x0, 0x0}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000002c40)={0x0, r0}) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'veth1\x00', 0x4}, 0x18) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) fcntl$getownex(r2, 0x10, &(0x7f0000002780)) r4 = gettid() ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000002cc0)={0x830a, 0x1, 0x6fff8, 0x4, 0x82d, 0x6e371b8c}) process_vm_readv(r4, &(0x7f0000000280)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/51, 0x33}], 0x3, &(0x7f00000026c0)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/232, 0xe8}, {&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000002480)=""/27, 0x1b}, {&(0x7f00000024c0)=""/35, 0x23}, {&(0x7f0000002580)=""/170, 0xaa}, {&(0x7f0000002640)=""/95, 0x5f}], 0x7, 0x0) setsockopt$inet_buf(r1, 0x0, 0x23, &(0x7f0000002a80)="22fba04ac187a79f26367989a730e7d1f940756b3f5c9c16e62cca13b2300e1c07b1be4e284cf0b12fa458ca19ff702da47ed97575deb5fb0623b9aa4f3f109a692742c0fb7a4505079bf2e41df913a54c1d09361258bb952c9e32d2c8896e3f9d57386d55a3f01827a437a17649e66ea7ccfe50b2f27e822d3afcd17f39cd32e903204771fc8d276f6e963be997fde186796cbc93a6abdd4e2ee1617272a1ec3cf6b29869f2ee", 0xa7) bind$vsock_dgram(r3, &(0x7f00000028c0)={0x28, 0x0, 0x0, @host}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000002bc0)={0x0, 'bond_slave_1\x00', 0x2}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) keyctl$get_security(0x11, 0x0, &(0x7f0000002900)=""/213, 0xd5) sendfile(r2, r2, &(0x7f0000000000), 0x2000005) shmget(0xffffffffffffffff, 0x3000, 0x78000441, &(0x7f0000ffc000/0x3000)=nil) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002880)) perf_event_open(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x400, 0x8, 0x311c522, 0x1000, 0x7fffffff, 0x0, 0x1, 0x3, 0x8, 0x5, 0x6, 0x908d, 0x955, 0x1, 0x0, 0x9, 0x7f, 0x0, 0x0, 0x5, 0xfff, 0x6, 0x8, 0xffff, 0x8, 0x0, 0x0, 0x8, 0x100000000, 0x8779, 0x0, 0x225, 0x0, @perf_bp={&(0x7f0000002540), 0x2}, 0x6900, 0xe790, 0x5, 0x7, 0x0, 0xb55}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000002a00)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x4e24, 0xb, @mcast1}, 0x0, [0x6, 0x0, 0x0, 0x0, 0x0, 0x1d30, 0x9]}, 0x5c) listxattr(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002d00)=""/247, 0xf7) fchmod(r2, 0x20) 15:30:17 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0xa70d, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:17 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0x4000000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:17 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) [ 570.145355] FAT-fs (loop1): bogus number of reserved sectors [ 570.192001] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:17 executing program 2: socket$netlink(0x10, 0x3, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000002a80)=ANY=[]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c80)={0x0, 0x0}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000002c40)={0x0, r0}) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'veth1\x00', 0x4}, 0x18) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) fcntl$getownex(r2, 0x10, &(0x7f0000002780)) r4 = gettid() ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000002cc0)={0x830a, 0x1, 0x6fff8, 0x4, 0x82d, 0x6e371b8c}) process_vm_readv(r4, &(0x7f0000000280)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/51, 0x33}], 0x3, &(0x7f00000026c0)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/232, 0xe8}, {&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000002480)=""/27, 0x1b}, {&(0x7f00000024c0)=""/35, 0x23}, {&(0x7f0000002580)=""/170, 0xaa}, {&(0x7f0000002640)=""/95, 0x5f}], 0x7, 0x0) setsockopt$inet_buf(r1, 0x0, 0x23, &(0x7f0000002a80)="22fba04ac187a79f26367989a730e7d1f940756b3f5c9c16e62cca13b2300e1c07b1be4e284cf0b12fa458ca19ff702da47ed97575deb5fb0623b9aa4f3f109a692742c0fb7a4505079bf2e41df913a54c1d09361258bb952c9e32d2c8896e3f9d57386d55a3f01827a437a17649e66ea7ccfe50b2f27e822d3afcd17f39cd32e903204771fc8d276f6e963be997fde186796cbc93a6abdd4e2ee1617272a1ec3cf6b29869f2ee", 0xa7) bind$vsock_dgram(r3, &(0x7f00000028c0)={0x28, 0x0, 0x0, @host}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000002bc0)={0x0, 'bond_slave_1\x00', 0x2}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) keyctl$get_security(0x11, 0x0, &(0x7f0000002900)=""/213, 0xd5) sendfile(r2, r2, &(0x7f0000000000), 0x2000005) shmget(0xffffffffffffffff, 0x3000, 0x78000441, &(0x7f0000ffc000/0x3000)=nil) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002880)) perf_event_open(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x400, 0x8, 0x311c522, 0x1000, 0x7fffffff, 0x0, 0x1, 0x3, 0x8, 0x5, 0x6, 0x908d, 0x955, 0x1, 0x0, 0x9, 0x7f, 0x0, 0x0, 0x5, 0xfff, 0x6, 0x8, 0xffff, 0x8, 0x0, 0x0, 0x8, 0x100000000, 0x8779, 0x0, 0x225, 0x0, @perf_bp={&(0x7f0000002540), 0x2}, 0x6900, 0xe790, 0x5, 0x7, 0x0, 0xb55}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000002a00)={{0xa, 0x0, 0x1, @mcast2}, {0xa, 0x4e24, 0xb, @mcast1}, 0x0, [0x6, 0x0, 0x0, 0x0, 0x0, 0x1d30, 0x9]}, 0x5c) listxattr(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002d00)=""/247, 0xf7) fchmod(r2, 0x20) [ 570.233521] IPVS: length: 193 != 8 [ 570.375241] IPVS: length: 193 != 8 15:30:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005180)=[{{&(0x7f0000004e80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000005100), 0x0, &(0x7f0000005140)=""/10, 0xa}}], 0x1, 0x0, &(0x7f0000005380)) shutdown(r0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0xfffffffffffffffb, {0x8, 0x0, 0x8000, 0x5, 0x200, 0x2}, 0x0, 0x6}, 0xe) 15:30:17 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0x1c020000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:17 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0x4000000000000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000180)=0x1f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, &(0x7f0000002e40)={0x77359400}) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = socket(0x15, 0x80005, 0x0) bind(r2, &(0x7f00000000c0)=@generic={0xa, "9bab292c32e608631f5c14d557d50a005efe7bb80b86526b51833790734bd83b320de89aefc9eb6dc2649bdf2b6ab524effc619e522cfbf5ea7aa1033b283235652bf370539dab5b776d5f788b9960df85ddf0e7bcb92ede0eb3db4ed679d4c3806342de9067b7aecf9a6ae4edd919aec5bdf5aecb8ef68d0797117341f7"}, 0x80) recvmmsg(r0, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0), 0x0, &(0x7f0000002d40)=""/47, 0x2f}}], 0x0, 0x0, &(0x7f00000002c0)={0x77359400}) 15:30:17 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x2702, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) [ 570.593550] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:a00:5efe:7bb8:b86, load rds_tcp or rds_rdma? [ 570.621754] IPVS: length: 193 != 8 [ 570.630119] RDS: rds_bind could not find a transport for 863:1f5c:14d5:57d5:a00:5efe:7bb8:b86, load rds_tcp or rds_rdma? 15:30:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) geteuid() getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)=""/28, &(0x7f00000000c0)=0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[{0x3, 0xa2f}, {}], 0x2000000000000188) [ 570.651428] IPVS: length: 193 != 8 15:30:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300000b000000000000000000000002001300020000000000000000000000020008fa8ce6419726610000000000000500058700000000000a00000400000000000000000000000000000000000000010000000000000000"], 0x58}}, 0x0) 15:30:17 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) [ 570.688078] FAT-fs (loop1): bogus number of reserved sectors [ 570.694376] FAT-fs (loop1): Can't find a valid FAT filesystem [ 570.784562] IPVS: length: 193 != 8 15:30:17 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xe, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) 15:30:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000040)) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000002c0), 0x2) 15:30:18 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0x40000000]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40a00, 0x123) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000300)='net/udp6\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x17c55195, 0x0, 0x0, 0x0, 0xffffffffffffffff, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b1177f4fc2eb04172daf510d1c4c4cf144aafb988de9bba6df5fd384d81bf6ba5629eef628582fba5bf4af44a0500fff1000000000300", "ee42e3ef1d1772a9432c220303f33a708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r4) 15:30:18 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[]) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="e9383f4da67e156fe4f74efab16c8ec73f8880884df556ae3a200df4aeeb2802d4783d8db94fd9a2ddb9dfaa24dd9fcaa33119856d1897c946d21ff1e785599aa3c3d24ac69a99e55c2d70e07f88b2f4e285c45d161b606e00e3037b46ebc411cd94f69c42c48eaf8f9bfe1296675ca0176515bd9ef2b849f6d13253a5da7c5fd3bba7092e0cc6f4b4b151ae025426831ebabd84ec27de1baa4a5832de6fdf2c263c9e66b8b0741c3f55ad5fd8"], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8000) open(&(0x7f00000000c0)='./file0/bus\x00', 0x20000, 0x18) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='security.SMACK64MMAP\x00', &(0x7f0000000340)="258ea80fe6f89cb25fc05ef58e23fc2a", 0x3b, 0x1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) getuid() syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32000]}, 0x2c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000004c0)) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2000, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x200) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000480)={0xffffffffffffff80, 0x6, 0x9, 0x0, 0x600700000000000}) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2"], 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000540)={0x2c, 0x0, r6, 0x16, 0xffffffffffffff9c}, 0x10) sendfile(r5, r5, &(0x7f0000000140)=0x843, 0x7fff) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xffff) 15:30:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)) close(0xffffffffffffffff) io_setup(0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unshare(0x8000400) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x427fe, 0x0) ioctl$int_in(r1, 0x8000008004500f, &(0x7f0000003ff8)) 15:30:18 executing program 3: r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\'\x00', 0xfffffffffffffffc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000200)={[0x0, 0x17000, 0xd000, 0x1004], 0xfff, 0x10, 0x82b}) r2 = add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)="be", 0xffffff1d, r0) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/3, 0x3) [ 571.057532] IPVS: length: 193 != 8 [ 571.101894] IPVS: length: 193 != 8 [ 571.114028] FAT-fs (loop1): bogus number of reserved sectors [ 571.120079] loop_reread_partitions: partition scan of loop0 (wS]}d I!ޒf8&WF5EiceZ%} [ 571.120079] ̈\) failed (rc=-16) 15:30:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000bc0000000000030006000000000002000000e0000054d81418186fd3b90002000100000000000000090bfff70020030005000000000002000000e00000010000000100000000"], 0x60}}, 0x0) [ 571.148353] FAT-fs (loop1): Can't find a valid FAT filesystem 15:30:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40a00, 0x123) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000300)='net/udp6\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x17c55195, 0x0, 0x0, 0x0, 0xffffffffffffffff, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b1177f4fc2eb04172daf510d1c4c4cf144aafb988de9bba6df5fd384d81bf6ba5629eef628582fba5bf4af44a0500fff1000000000300", "ee42e3ef1d1772a9432c220303f33a708ad791137e2982fcce5d747a3131995a"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r4) 15:30:18 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r0, &(0x7f0000000600)="7c287cb5cad0a72b0973f0691403c3d1bd368b22b815fa34b91a9d149453d9f88f70bd9b7522ed2cb7cf3bfb34ae771e202f2dab8c17f96d16cbe9b56d5501381c32136995fc49b48a89a83e386dbd5f6782bea1f596a551bdc6fbc9245733e7427f02079ef91d2f64ac435a5dda6031e457f61396fc0eaf17923d8443d1a370ec4694b482457ac18329a53b460900e81fbcc69e6e9641268d017f82a5be2b9d332d1c0f7bbcb629139a2bdfbb5b58a69d4d589d9efaf2be", 0xb8, 0x48800, &(0x7f00000003c0)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffff, 0x7]) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x6, @local, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x11}, 0x2c) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f00000002c0)=""/60, &(0x7f0000000540)=0xffb3) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, 0x0) r4 = getpgrp(0x0) prlimit64(r4, 0x0, &(0x7f0000000000), &(0x7f0000000040)) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e22}, 0x10) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d, @rand_addr}, {0x2, 0x4e23, @empty, [0x0, 0x0, 0xfd00]}, {0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x21}}, 0x1c, 0x5, 0x7fff, 0x9976, 0x5, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22, @rand_addr=0x2000000}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0x0, 0x6, 0x20, 0x40, 0x0, 0x0, 0xcf39, 0x80000001, 0x4}) socket$inet6(0xa, 0xa, 0xc195) r6 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r6) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000380)={0xb31, 0x3}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000180)=""/193, &(0x7f0000000280)=0xc1) 15:30:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x2, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6409c7d6730df8"], 0x2) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=0x0], 0x1c6) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 571.436977] IPVS: length: 193 != 8 [ 571.492649] IPVS: length: 193 != 8 [ 574.152624] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 577.187780] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 580.222970] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 583.258184] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 586.293354] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 589.328575] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 592.363748] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 595.398930] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 598.434124] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 601.469338] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 603.002082] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 604.504555] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 606.037258] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 607.539745] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 609.072462] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 610.574907] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 612.107631] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 613.610100] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 615.142889] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 616.645299] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 618.178010] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 619.680488] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 621.213275] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 622.715675] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 624.248434] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 625.750869] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 627.283584] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 628.786064] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 630.318781] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 631.821259] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 633.353975] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 634.856457] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 636.389162] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 637.891661] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 639.424379] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 640.926829] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 642.460500] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 643.962054] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 645.494777] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 646.997224] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 648.529952] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 650.032412] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 651.565123] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 653.067599] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 654.600346] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 656.102792] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 657.635512] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 659.137986] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 660.670733] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 662.173178] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 663.705898] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 665.208370] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 666.742017] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 668.243562] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 669.776281] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 671.278758] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 672.811487] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 674.313944] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 675.846662] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 677.349141] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 678.881861] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 680.384324] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 681.917044] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 683.419536] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 684.952279] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 686.454707] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 687.988392] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 689.489903] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 691.022624] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 692.525095] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 694.057817] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 695.560328] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 697.093038] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 698.595501] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 700.128205] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 701.630684] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 703.163393] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 704.665861] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 706.198582] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 707.701056] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 709.233796] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 710.736253] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 712.268974] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 713.771435] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 715.304163] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 716.806636] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 718.339357] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 719.841839] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 721.374555] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 722.262023] INFO: task syz-executor0:5587 blocked for more than 140 seconds. [ 722.269269] Not tainted 4.19.0-rc7-next-20181015+ #94 [ 722.292156] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 722.300136] syz-executor0 D13832 5587 1 0x00000004 [ 722.312327] Call Trace: [ 722.314939] __schedule+0x8cf/0x21d0 [ 722.318663] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 722.332529] ? retint_kernel+0x2d/0x2d [ 722.336442] ? __sched_text_start+0x8/0x8 [ 722.340612] ? zap_class+0x640/0x640 [ 722.362756] ? lock_downgrade+0x900/0x900 [ 722.366921] ? check_preemption_disabled+0x48/0x280 [ 722.372056] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 722.393003] ? kasan_check_read+0x11/0x20 [ 722.397193] ? find_held_lock+0x36/0x1c0 [ 722.401275] schedule+0xfe/0x460 [ 722.413177] ? __mutex_lock+0xafa/0x16f0 [ 722.417265] ? __schedule+0x21d0/0x21d0 [ 722.421258] ? kasan_check_read+0x11/0x20 [ 722.443427] ? do_raw_spin_unlock+0xa7/0x330 [ 722.447867] ? do_raw_spin_trylock+0x270/0x270 [ 722.452458] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 722.473675] ? mutex_destroy+0x200/0x200 [ 722.477792] schedule_preempt_disabled+0x13/0x20 [ 722.482569] __mutex_lock+0xaff/0x16f0 [ 722.493932] ? vfat_lookup+0xf1/0x640 [ 722.497763] ? mutex_trylock+0x2b0/0x2b0 [ 722.501981] ? check_preemption_disabled+0x48/0x280 [ 722.524101] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 722.529046] ? kasan_check_read+0x11/0x20 [ 722.533201] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 722.554348] ? rcu_softirq_qs+0x20/0x20 [ 722.558337] ? trace_hardirqs_off_caller+0x300/0x300 [ 722.563469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.584695] ? d_alloc_parallel+0xb7c/0x1f40 [ 722.589126] ? zap_class+0x640/0x640 [ 722.592860] ? __d_lookup_rcu+0xaa0/0xaa0 [ 722.604770] ? zap_class+0x640/0x640 [ 722.608510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.614054] ? zap_class+0x640/0x640 [ 722.635040] ? zap_class+0x640/0x640 [ 722.638831] mutex_lock_nested+0x16/0x20 [ 722.642902] ? mutex_lock_nested+0x16/0x20 [ 722.655185] vfat_lookup+0xf1/0x640 [ 722.658825] ? __lockdep_init_map+0x105/0x590 [ 722.663329] ? vfat_find_form+0x120/0x120 [ 722.675353] ? lockdep_init_map+0x9/0x10 [ 722.679493] ? __init_waitqueue_head+0x9e/0x150 [ 722.684176] ? init_wait_entry+0x1c0/0x1c0 [ 722.688917] ? lock_acquire+0x1ed/0x520 [ 722.692914] __lookup_slow+0x2b5/0x540 [ 722.697244] ? vfs_unlink+0x510/0x510 [ 722.701081] ? path_init+0x1ed0/0x1ed0 [ 722.704973] ? path_init+0x1538/0x1ed0 [ 722.709317] lookup_slow+0x57/0x80 [ 722.712877] walk_component+0x92b/0x2590 [ 722.717380] ? trace_hardirqs_on+0xbd/0x310 [ 722.721716] ? check_preemption_disabled+0x48/0x280 [ 722.727187] ? path_init+0x1538/0x1ed0 [ 722.731090] ? trace_hardirqs_off_caller+0x300/0x300 [ 722.736785] ? pick_link+0xaf0/0xaf0 [ 722.740530] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 722.745552] ? set_root+0x42b/0x810 [ 722.749722] ? vfs_mknod+0x800/0x800 [ 722.753456] ? trace_hardirqs_on+0xbd/0x310 [ 722.758365] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 722.763677] ? path_openat+0x220/0x5150 [ 722.768107] ? trace_hardirqs_off_caller+0x300/0x300 [ 722.773242] ? debug_mutex_init+0x2d/0x60 [ 722.777867] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 722.782902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.788901] ? security_inode_permission+0xd2/0x100 [ 722.793933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.806743] ? vfat_hashi+0x14d/0x390 [ 722.810605] link_path_walk.part.40+0xa61/0x1530 [ 722.815394] ? lookup_open+0x1b90/0x1b90 [ 722.836698] ? walk_component+0x2590/0x2590 [ 722.841037] ? find_held_lock+0x36/0x1c0 [ 722.845110] ? check_preemption_disabled+0x48/0x280 [ 722.866957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.872546] ? percpu_counter_add_batch+0x141/0x190 [ 722.878024] syz-executor0(24388): getblk(): executed=9 bh_count=0 bh_state=0 [ 722.888120] path_openat+0x270/0x5150 [ 722.891946] ? rcu_softirq_qs+0x20/0x20 [ 722.895979] ? unwind_dump+0x190/0x190 [ 722.917366] ? zap_class+0x640/0x640 [ 722.921101] ? path_lookupat.isra.43+0xc00/0xc00 [ 722.925863] ? unwind_get_return_address+0x61/0xa0 [ 722.947607] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 722.952653] ? expand_files.part.8+0x571/0x9a0 [ 722.957252] ? find_held_lock+0x36/0x1c0 [ 722.967785] ? __alloc_fd+0x347/0x6e0 [ 722.971605] ? lock_downgrade+0x900/0x900 [ 722.975755] ? getname+0x19/0x20 [ 722.998044] ? kasan_check_read+0x11/0x20 [ 723.002211] ? do_raw_spin_unlock+0xa7/0x330 [ 723.006633] ? do_raw_spin_trylock+0x270/0x270 [ 723.019264] ? __lock_is_held+0xb5/0x140 [ 723.023369] ? __check_object_size+0xb1/0x782 [ 723.027885] ? _raw_spin_unlock+0x2c/0x50 [ 723.048446] ? __alloc_fd+0x347/0x6e0 [ 723.052293] do_filp_open+0x255/0x380 [ 723.056106] ? may_open_dev+0x100/0x100 [ 723.068651] ? get_unused_fd_flags+0x122/0x1a0 [ 723.073295] ? __alloc_fd+0x6e0/0x6e0 [ 723.077122] do_sys_open+0x568/0x700 [ 723.081331] ? filp_open+0x80/0x80 [ 723.084892] ? trace_hardirqs_off_caller+0x300/0x300 [ 723.090494] __x64_sys_open+0x7e/0xc0 [ 723.094327] do_syscall_64+0x1b9/0x820 [ 723.098226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 723.119032] ? syscall_return_slowpath+0x5e0/0x5e0 [ 723.123982] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.128848] ? trace_hardirqs_on_caller+0x310/0x310 [ 723.149331] ? prepare_exit_to_usermode+0x291/0x3b0 [ 723.154398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.159270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.179543] RIP: 0033:0x455570 [ 723.182771] Code: Bad RIP value. [ 723.186136] RSP: 002b:00007ffdf29f6100 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 [ 723.209774] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455570 [ 723.217056] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00000000004bc2ae [ 723.240038] RBP: 00000000000006f3 R08: 0000000000000001 R09: 0000000001f84940 [ 723.247362] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 723.270283] R13: 000000000008ad37 R14: 00000000000001ce R15: 0000000000000000 [ 723.277628] [ 723.277628] Showing all locks held in the system: [ 723.285347] 4 locks held by kworker/u4:1/21: [ 723.289768] 1 lock held by khungtaskd/983: [ 723.294439] #0: 0000000070e1c7cd (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 723.303524] 1 lock held by rsyslogd/5455: [ 723.307678] #0: 0000000035d6b82e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 723.316102] 2 locks held by getty/5544: [ 723.320079] #0: 000000006d678142 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.328776] #1: 00000000e80d108e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.338146] 2 locks held by getty/5545: [ 723.342618] #0: 0000000053c7112a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.350886] #1: 0000000001c4f352 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.360185] 2 locks held by getty/5546: [ 723.364612] #0: 000000002fa44e79 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.381667] #1: 00000000bc3ed78f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.390573] 2 locks held by getty/5547: [ 723.412408] #0: 0000000061acf22d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.420739] #1: 00000000f77efb96 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.451786] 2 locks held by getty/5548: [ 723.455768] #0: 000000003022602d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.472011] #1: 00000000d889d908 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.480885] 2 locks held by getty/5549: [ 723.485307] #0: 000000006bdbc5a6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.493984] #1: 00000000e7be2982 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.503959] 2 locks held by getty/5550: [ 723.507938] #0: 000000006ca8555b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 723.516647] #1: 00000000e571f98a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 723.526102] 2 locks held by syz-executor0/5587: [ 723.530777] #0: 00000000a4938e38 (&sb->s_type->i_mutex_key#24){++++}, at: lookup_slow+0x49/0x80 [ 723.540157] #1: 00000000dd0abd6e (&sbi->s_lock){+.+.}, at: vfat_lookup+0xf1/0x640 [ 723.549266] 3 locks held by syz-executor0/24388: [ 723.554454] [ 723.556100] ============================================= [ 723.556100] [ 723.563575] NMI backtrace for cpu 1 [ 723.567219] CPU: 1 PID: 983 Comm: khungtaskd Not tainted 4.19.0-rc7-next-20181015+ #94 [ 723.575283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.584638] Call Trace: [ 723.587235] dump_stack+0x244/0x39d [ 723.590879] ? dump_stack_print_info.cold.1+0x20/0x20 [ 723.596084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.601636] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 723.606391] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 723.611595] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 723.616910] arch_trigger_cpumask_backtrace+0x14/0x20 [ 723.622108] watchdog+0xb39/0x1050 [ 723.625670] ? reset_hung_task_detector+0xd0/0xd0 [ 723.630524] ? __kthread_parkme+0xce/0x1a0 [ 723.634772] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 723.639887] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 723.644998] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 723.649592] ? trace_hardirqs_on+0xbd/0x310 [ 723.653924] ? kasan_check_read+0x11/0x20 [ 723.658078] ? __kthread_parkme+0xce/0x1a0 [ 723.662320] ? trace_hardirqs_off_caller+0x300/0x300 [ 723.667432] ? trace_hardirqs_off_caller+0x300/0x300 [ 723.672564] ? lockdep_init_map+0x9/0x10 [ 723.676639] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 723.681753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.687315] ? __kthread_parkme+0xfb/0x1a0 [ 723.691575] ? reset_hung_task_detector+0xd0/0xd0 [ 723.696439] kthread+0x35a/0x440 [ 723.699823] ? kthread_stop+0x8f0/0x8f0 [ 723.703802] ret_from_fork+0x3a/0x50 [ 723.707683] Sending NMI from CPU 1 to CPUs 0: [ 723.714203] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.733 msecs [ 723.714207] NMI backtrace for cpu 0 [ 723.714219] CPU: 0 PID: 24388 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181015+ #94 [ 723.714226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.714230] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0xd/0x20 [ 723.714243] Code: d6 0f b7 f7 bf 03 00 00 00 48 89 e5 48 8b 4d 08 e8 88 fe ff ff 5d c3 66 0f 1f 44 00 00 55 89 f2 89 fe bf 05 00 00 00 48 89 e5 <48> 8b 4d 08 e8 6a fe ff ff 5d c3 0f 1f 84 00 00 00 00 00 55 48 89 [ 723.714255] RSP: 0018:ffff8801c711e7d0 EFLAGS: 00000046 [ 723.714265] RAX: ffff8801c79360c0 RBX: 0000000000000000 RCX: ffffffff81e19c25 [ 723.714272] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 723.714278] RBP: ffff8801c711e7d0 R08: ffff8801c79360c0 R09: fffff94000d628de [ 723.714285] R10: fffff94000d628de R11: ffffea0006b146f7 R12: 0000000000000000 [ 723.714291] R13: ffffffff8840fa80 R14: ffffffff8815c5a0 R15: 000000000005d027 [ 723.714298] FS: 0000000001f84940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 723.714304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 723.714310] CR2: 00007fada1733000 CR3: 00000001cd903000 CR4: 00000000001406f0 [ 723.714316] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 723.714323] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 723.714326] Call Trace: [ 723.714346] check_preemption_disabled+0x3a/0x280 [ 723.714350] __this_cpu_preempt_check+0x1c/0x20 [ 723.714354] __find_get_block+0x183/0xf10 [ 723.714359] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 723.714379] ? retint_kernel+0x1b/0x2d [ 723.714384] ? try_to_free_buffers+0xd40/0xd40 [ 723.714389] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.714408] ? unlock_page+0x2c2/0x4c0 [ 723.714412] ? wake_up_page_bit+0x6f0/0x6f0 [ 723.714432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.714437] ? init_page_buffers+0x433/0x570 [ 723.714441] ? __set_page_dirty_buffers+0x810/0x810 [ 723.714445] ? __getblk_gfp+0x61b/0x1030 [ 723.714449] __getblk_gfp+0x3d3/0x1030 [ 723.714453] ? __find_get_block+0xf10/0xf10 [ 723.714457] ? zap_class+0x640/0x640 [ 723.714485] ? __lock_is_held+0xb5/0x140 [ 723.714490] ? perf_trace_sched_process_exec+0x860/0x860 [ 723.714495] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 723.714499] ? kasan_check_write+0x14/0x20 [ 723.714503] ? __brelse+0x104/0x180 [ 723.714508] ? block_commit_write+0x30/0x30 [ 723.714512] __bread_gfp+0x2d/0x310 [ 723.714516] fat__get_entry+0x5a6/0xa40 [ 723.714535] ? rcu_read_lock_sched_held+0x14f/0x180 [ 723.714539] ? copy_overflow+0x30/0x30 [ 723.714543] ? fat_parse_long+0x554/0xb70 [ 723.714548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.714552] fat_search_long+0x33b/0x1570 [ 723.714557] ? fat_parse_short+0x2cc0/0x2cc0 [ 723.714560] ? zap_class+0x640/0x640 [ 723.714565] ? __d_lookup_rcu+0xaa0/0xaa0 [ 723.714569] ? zap_class+0x640/0x640 [ 723.714574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.714577] ? zap_class+0x640/0x640 [ 723.714581] ? zap_class+0x640/0x640 [ 723.714585] vfat_find+0x16d/0x1a0 [ 723.714589] vfat_lookup+0x107/0x640 [ 723.714593] ? __lockdep_init_map+0x105/0x590 [ 723.714597] ? vfat_find_form+0x120/0x120 [ 723.714601] ? lockdep_init_map+0x9/0x10 [ 723.714606] ? __init_waitqueue_head+0x9e/0x150 [ 723.714625] ? init_wait_entry+0x1c0/0x1c0 [ 723.714629] ? lock_acquire+0x1ed/0x520 [ 723.714633] __lookup_slow+0x2b5/0x540 [ 723.714636] ? vfs_unlink+0x510/0x510 [ 723.714640] ? path_init+0x1ed0/0x1ed0 [ 723.714644] ? path_init+0x1538/0x1ed0 [ 723.714648] lookup_slow+0x57/0x80 [ 723.714652] walk_component+0x92b/0x2590 [ 723.714656] ? trace_hardirqs_on+0xbd/0x310 [ 723.714660] ? check_preemption_disabled+0x48/0x280 [ 723.714664] ? path_init+0x1538/0x1ed0 [ 723.714669] ? trace_hardirqs_off_caller+0x300/0x300 [ 723.714673] ? pick_link+0xaf0/0xaf0 [ 723.714677] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 723.714681] ? set_root+0x42b/0x810 [ 723.714685] ? vfs_mknod+0x800/0x800 [ 723.714689] ? trace_hardirqs_on+0xbd/0x310 [ 723.714693] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 723.714697] ? path_openat+0x220/0x5150 [ 723.714702] ? trace_hardirqs_off_caller+0x300/0x300 [ 723.714706] ? debug_mutex_init+0x2d/0x60 [ 723.714710] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 723.714715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.714719] ? security_inode_permission+0xd2/0x100 [ 723.714739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.714742] ? vfat_hashi+0x14d/0x390 [ 723.714746] link_path_walk.part.40+0xa61/0x1530 [ 723.714750] ? lookup_open+0x1b90/0x1b90 [ 723.714769] ? walk_component+0x2590/0x2590 [ 723.714773] ? find_held_lock+0x36/0x1c0 [ 723.714778] ? check_preemption_disabled+0x48/0x280 [ 723.714783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.714787] ? percpu_counter_add_batch+0x141/0x190 [ 723.714791] path_openat+0x270/0x5150 [ 723.714809] ? rcu_softirq_qs+0x20/0x20 [ 723.714813] ? unwind_dump+0x190/0x190 [ 723.714817] ? zap_class+0x640/0x640 [ 723.714822] ? path_lookupat.isra.43+0xc00/0xc00 [ 723.714842] ? unwind_get_return_address+0x61/0xa0 [ 723.714847] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 723.714852] ? expand_files.part.8+0x571/0x9a0 [ 723.714856] ? find_held_lock+0x36/0x1c0 [ 723.714860] ? __alloc_fd+0x347/0x6e0 [ 723.714865] ? lock_downgrade+0x900/0x900 [ 723.714869] ? getname+0x19/0x20 [ 723.714873] ? kasan_check_read+0x11/0x20 [ 723.714878] ? do_raw_spin_unlock+0xa7/0x330 [ 723.714882] ? do_raw_spin_trylock+0x270/0x270 [ 723.714887] ? __lock_is_held+0xb5/0x140 [ 723.714891] ? __check_object_size+0xb1/0x782 [ 723.714896] ? _raw_spin_unlock+0x2c/0x50 [ 723.714900] ? __alloc_fd+0x347/0x6e0 [ 723.714904] do_filp_open+0x255/0x380 [ 723.714909] ? may_open_dev+0x100/0x100 [ 723.714913] ? get_unused_fd_flags+0x122/0x1a0 [ 723.714917] ? __alloc_fd+0x6e0/0x6e0 [ 723.714921] do_sys_open+0x568/0x700 [ 723.714925] ? filp_open+0x80/0x80 [ 723.714930] ? __ia32_sys_unlink+0x50/0x50 [ 723.714935] ? trace_hardirqs_off_caller+0x300/0x300 [ 723.714939] __x64_sys_open+0x7e/0xc0 [ 723.714943] do_syscall_64+0x1b9/0x820 [ 723.714949] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 723.714954] ? syscall_return_slowpath+0x5e0/0x5e0 [ 723.714958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.714963] ? trace_hardirqs_on_caller+0x310/0x310 [ 723.714968] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 723.714973] ? prepare_exit_to_usermode+0x291/0x3b0 [ 723.714978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.714984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.714988] RIP: 0033:0x411180 [ 723.715001] Code: 01 f0 ff ff 0f 83 e0 17 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 2d 4e 63 00 00 75 14 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff [ 723.715006] RSP: 002b:00007ffdf29f5c98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 723.715017] RAX: ffffffffffffffda RBX: 00007ffdf29f5cc4 RCX: 0000000000411180 [ 723.715024] RDX: 00007ffdf29f5cca RSI: 0000000000080001 RDI: 00000000004bcfb9 [ 723.715030] RBP: 00007ffdf29f5cc0 R08: 0000000000000000 R09: 0000000000000004 [ 723.715037] R10: 0000000000000075 R11: 0000000000000246 R12: 00000000004bcfb9 [ 723.715043] R13: 0000000000000000 R14: 00000000000001ce R15: 0000000000000000 [ 723.734123] Kernel panic - not syncing: hung_task: blocked tasks [ 724.409486] CPU: 1 PID: 983 Comm: khungtaskd Not tainted 4.19.0-rc7-next-20181015+ #94 [ 724.417543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.426899] Call Trace: [ 724.429507] dump_stack+0x244/0x39d [ 724.429921] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 724.433147] ? dump_stack_print_info.cold.1+0x20/0x20 [ 724.445207] panic+0x2ad/0x55c [ 724.448410] ? add_taint.cold.5+0x16/0x16 [ 724.452580] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 724.458037] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 724.463502] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 724.468958] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 724.474449] watchdog+0xb4a/0x1050 [ 724.478018] ? reset_hung_task_detector+0xd0/0xd0 [ 724.482874] ? __kthread_parkme+0xce/0x1a0 [ 724.487124] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 724.492236] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 724.497353] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 724.502450] ? trace_hardirqs_on+0xbd/0x310 [ 724.506800] ? kasan_check_read+0x11/0x20 [ 724.510956] ? __kthread_parkme+0xce/0x1a0 [ 724.515200] ? trace_hardirqs_off_caller+0x300/0x300 [ 724.520307] ? trace_hardirqs_off_caller+0x300/0x300 [ 724.525418] ? lockdep_init_map+0x9/0x10 [ 724.529498] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 724.534622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.540165] ? __kthread_parkme+0xfb/0x1a0 [ 724.544415] ? reset_hung_task_detector+0xd0/0xd0 [ 724.549271] kthread+0x35a/0x440 [ 724.552651] ? kthread_stop+0x8f0/0x8f0 [ 724.556636] ret_from_fork+0x3a/0x50 [ 724.561565] Kernel Offset: disabled [ 724.565191] Rebooting in 86400 seconds..