[ 43.581798][ T26] audit: type=1800 audit(1553053001.467:30): pid=8014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 48.881632][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 48.881649][ T26] audit: type=1400 audit(1553053006.807:35): avc: denied { map } for pid=8186 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.15.224' (ECDSA) to the list of known hosts. 2019/03/20 03:36:53 fuzzer started [ 55.279473][ T26] audit: type=1400 audit(1553053013.207:36): avc: denied { map } for pid=8195 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/03/20 03:36:55 dialing manager at 10.128.0.26:46201 2019/03/20 03:36:55 syscalls: 1 2019/03/20 03:36:55 code coverage: enabled 2019/03/20 03:36:55 comparison tracing: enabled 2019/03/20 03:36:55 extra coverage: extra coverage is not supported by the kernel 2019/03/20 03:36:55 setuid sandbox: enabled 2019/03/20 03:36:55 namespace sandbox: enabled 2019/03/20 03:36:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/20 03:36:55 fault injection: enabled 2019/03/20 03:36:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/20 03:36:55 net packet injection: enabled 2019/03/20 03:36:55 net device setup: enabled 03:39:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x4, 0x0, 0xffffff7f]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 215.034213][ T26] audit: type=1400 audit(1553053172.957:37): avc: denied { map } for pid=8209 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=3247 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 215.154659][ T8210] IPVS: ftp: loaded support on port[0] = 21 03:39:33 executing program 1: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000100)="1f0000000104fffffd3b54c007110000f30501000b000500000000000000a0", 0x1f) [ 215.314199][ T8210] chnl_net:caif_netlink_parms(): no params data found [ 215.375992][ T8210] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.384862][ T8210] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.389177][ T8213] IPVS: ftp: loaded support on port[0] = 21 [ 215.398866][ T8210] device bridge_slave_0 entered promiscuous mode [ 215.408670][ T8210] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.415821][ T8210] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.424118][ T8210] device bridge_slave_1 entered promiscuous mode [ 215.453274][ T8210] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.463916][ T8210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.498025][ T8210] team0: Port device team_slave_0 added [ 215.505717][ T8210] team0: Port device team_slave_1 added 03:39:33 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 215.630267][ T8210] device hsr_slave_0 entered promiscuous mode [ 215.668476][ T8210] device hsr_slave_1 entered promiscuous mode 03:39:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) [ 215.806726][ T8216] IPVS: ftp: loaded support on port[0] = 21 [ 215.823563][ T8210] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.831029][ T8210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.839119][ T8210] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.846305][ T8210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.993050][ T8218] IPVS: ftp: loaded support on port[0] = 21 03:39:34 executing program 4: socket$inet(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) inotify_init() syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x40000000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={0x0}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 216.040669][ T8213] chnl_net:caif_netlink_parms(): no params data found [ 216.054402][ T8210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.149250][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.189772][ T2995] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.219413][ T2995] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.233184][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 216.251231][ T8210] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.295010][ T8224] IPVS: ftp: loaded support on port[0] = 21 [ 216.297491][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.312967][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.323760][ T2995] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.330978][ T2995] bridge0: port 1(bridge_slave_0) entered forwarding state 03:39:34 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="19ce78ef40001bf05ba59f4d168ab06ddb7e69f07cd9448d150a2a5d7427a948fdedc45354f7d9d566c7bae1e1229315a8a6ae74a2abd78548"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 216.341714][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.350964][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.362017][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.369234][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.385239][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.432337][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.444088][ T8216] chnl_net:caif_netlink_parms(): no params data found [ 216.482593][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.492184][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.502276][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.511357][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.519846][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.528325][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.536540][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.545109][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.563950][ T8210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.575457][ T8213] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.582688][ T8213] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.590597][ T8213] device bridge_slave_0 entered promiscuous mode [ 216.608360][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.636758][ T8226] IPVS: ftp: loaded support on port[0] = 21 [ 216.643721][ T8216] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.651200][ T8216] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.659355][ T8216] device bridge_slave_0 entered promiscuous mode [ 216.667649][ T8213] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.674726][ T8213] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.682710][ T8213] device bridge_slave_1 entered promiscuous mode [ 216.708108][ T8216] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.715255][ T8216] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.723911][ T8216] device bridge_slave_1 entered promiscuous mode [ 216.771723][ T8213] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.782475][ T8213] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.801700][ T8210] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.811633][ T8216] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.842651][ T8213] team0: Port device team_slave_0 added [ 216.853015][ T8213] team0: Port device team_slave_1 added [ 216.864955][ T8216] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.919215][ T26] audit: type=1400 audit(1553053174.837:38): avc: denied { associate } for pid=8210 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 216.955436][ T8218] chnl_net:caif_netlink_parms(): no params data found [ 216.974628][ T8216] team0: Port device team_slave_0 added [ 216.983103][ T8216] team0: Port device team_slave_1 added 03:39:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r3 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0x30008) sync() r4 = open(&(0x7f0000000000)='./bus\x00', 0x140042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xa) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 217.070146][ T8213] device hsr_slave_0 entered promiscuous mode [ 217.137866][ T8213] device hsr_slave_1 entered promiscuous mode 03:39:35 executing program 0: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 217.321338][ T8213] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.328484][ T8213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.336312][ T8213] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.343607][ T8213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.353773][ T8218] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.361953][ T8218] bridge0: port 1(bridge_slave_0) entered disabled state 03:39:35 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) [ 217.370143][ T8218] device bridge_slave_0 entered promiscuous mode [ 217.379016][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.388349][ T12] bridge0: port 2(bridge_slave_1) entered disabled state 03:39:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 217.413109][ T8224] chnl_net:caif_netlink_parms(): no params data found [ 217.471475][ T8216] device hsr_slave_0 entered promiscuous mode [ 217.508439][ T8216] device hsr_slave_1 entered promiscuous mode 03:39:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 217.577753][ T8218] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.595861][ T8218] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.609670][ T8218] device bridge_slave_1 entered promiscuous mode 03:39:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 217.658579][ T8226] chnl_net:caif_netlink_parms(): no params data found [ 217.674678][ T8218] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.729415][ T8218] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.766283][ T8218] team0: Port device team_slave_0 added 03:39:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 217.775023][ T8224] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.783252][ T8224] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.791729][ T8224] device bridge_slave_0 entered promiscuous mode [ 217.808344][ T8218] team0: Port device team_slave_1 added [ 217.844341][ T8224] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.852589][ T8224] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.869621][ T8224] device bridge_slave_1 entered promiscuous mode [ 217.897241][ T8213] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.000963][ T8218] device hsr_slave_0 entered promiscuous mode [ 218.057766][ T8218] device hsr_slave_1 entered promiscuous mode [ 218.116491][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.124787][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.140282][ T8224] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.156535][ T8216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.165147][ T8213] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.175705][ T8226] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.183360][ T8226] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.192097][ T8226] device bridge_slave_0 entered promiscuous mode [ 218.201469][ T8224] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.221760][ T8226] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.229391][ T8226] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.237186][ T8226] device bridge_slave_1 entered promiscuous mode [ 218.263396][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.273607][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.282713][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.289866][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.318324][ T8226] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.339029][ T8224] team0: Port device team_slave_0 added [ 218.346140][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.357189][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.366573][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.373961][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.383182][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.392742][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.401968][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.412070][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.421250][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.430161][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.441185][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.449847][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.467069][ T8226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.496593][ T8224] team0: Port device team_slave_1 added [ 218.505623][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.514283][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.522880][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.535902][ T8226] team0: Port device team_slave_0 added [ 218.544502][ T8226] team0: Port device team_slave_1 added [ 218.555953][ T8213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 218.566899][ T8216] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.574440][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.582625][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.660289][ T8226] device hsr_slave_0 entered promiscuous mode [ 218.709833][ T8226] device hsr_slave_1 entered promiscuous mode [ 218.790383][ T8224] device hsr_slave_0 entered promiscuous mode [ 218.827865][ T8224] device hsr_slave_1 entered promiscuous mode [ 218.897346][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.908942][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.920423][ T8227] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.928221][ T8227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.936111][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.945260][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.953740][ T8227] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.960820][ T8227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.969058][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.977958][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.986889][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.014986][ T8213] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.043651][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.052625][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.061424][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.070076][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.079097][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.087711][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.096768][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.135205][ T8216] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.147203][ T8216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.156763][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.165713][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.184446][ T8218] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.235901][ T26] audit: type=1400 audit(1553053177.157:39): avc: denied { create } for pid=8267 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 219.239558][ T8268] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 219.268829][ T8218] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.280852][ T8268] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 219.294519][ T26] audit: type=1400 audit(1553053177.167:40): avc: denied { write } for pid=8267 comm="syz-executor.1" path="socket:[28862]" dev="sockfs" ino=28862 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 219.306804][ T8268] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 03:39:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 219.324464][ T8269] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 219.343667][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.352268][ T8227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.375912][ T8224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.396243][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.414905][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.424061][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.431469][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.440859][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.450298][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.460483][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.467626][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.476551][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.488508][ T8216] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.508275][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.525997][ T8226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.537889][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.546773][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.555496][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.573680][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.586408][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.595126][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.603783][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.613558][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.628960][ T8226] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.652845][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.665267][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.674718][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.692516][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.710206][ T8214] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.717578][ T8214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.731946][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.741970][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.750904][ T8214] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.758991][ T8214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.767530][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.782203][ T8224] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.792781][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.802622][ C0] hrtimer: interrupt took 27082 ns [ 219.809438][ T8214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.852297][ T8279] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 219.858147][ T8224] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 219.873498][ T8224] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.893757][ T8279] FAT-fs (loop2): Filesystem has been set read-only [ 219.894525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.916155][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.925709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.942034][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.953269][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.966333][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.977240][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.984402][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.993776][ T8276] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 219.999940][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.003930][ T8276] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 220.018360][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.035600][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.035684][ T8279] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 220.044364][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.078419][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.087256][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.095545][ T8282] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 220.096659][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.112223][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.121979][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.131110][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.140231][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 03:39:38 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) [ 220.149604][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.163586][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.173838][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.182636][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.191127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.199853][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.208410][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.218128][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.226207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.234368][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.242416][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.264007][ T8226] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 220.275894][ T8226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.304882][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.313955][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.324110][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.333376][ T8222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.343818][ T8224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.352140][ T8218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.366908][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.390129][ T8218] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.417896][ T8226] 8021q: adding VLAN 0 to HW filter on device batadv0 03:39:38 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 220.828910][ T8306] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 220.847771][ T8306] FAT-fs (loop3): Filesystem has been set read-only [ 220.886691][ T8302] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 220.902522][ T8302] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 03:39:39 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040), 0x0) 03:39:39 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x4, 0x0, 0xffffff7f]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 03:39:39 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @null, 0x1}, [@null, @netrom, @remote, @rose, @remote, @bcast, @null, @default]}, 0x48) 03:39:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 03:39:39 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) [ 221.153839][ T8318] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:39:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:39:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x06\x00', @ifru_mtu=0x1}) [ 221.320277][ T8331] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:39:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 221.362938][ T8339] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 03:39:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 221.471935][ T8331] FAT-fs (loop2): Filesystem has been set read-only 03:39:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x15, 0x0) 03:39:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 221.660815][ T8315] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 221.686856][ T8355] FAT-fs (loop5): bogus number of reserved sectors [ 221.703937][ T8315] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 221.744642][ T8355] FAT-fs (loop5): Can't find a valid FAT filesystem 03:39:39 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:39 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x2) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) r3 = syz_open_dev$usbmon(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000008c0)={0x5, 0x22e, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x2}}, 0x6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23, @rand_addr=0x400}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:39:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 221.824977][ T8355] FAT-fs (loop5): bogus number of reserved sectors [ 221.848749][ T8355] FAT-fs (loop5): Can't find a valid FAT filesystem 03:39:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000080)={0x3, 0x0, 0x20, 0x0, 0x0, 0x0}, 0x40a) 03:39:39 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) 03:39:39 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) [ 222.031410][ T26] audit: type=1400 audit(1553053179.957:41): avc: denied { map_create } for pid=8370 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x200000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000980)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:qemu_device_t:s0\x00', 0x23, 0x2) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='udf\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000c00)={0x0, @raw_data="2e53908f2f62d03acbc4fb70aaba1b0ab1cc5f5318992ee912d559e1b9daca16e3105c45d6a0a498f128818930fa0ed2d3783272116b36f1171711b144e317d5a8b83a3b77851e1c17cd2489dda1cfe6ecc324c3d33b4a5d8d5ceed103aa39ad9ead7b9efd995c2a59e8a62809effd4cb44c45e33aef5037d50bb8585f566d5258706d9513004bc3309f47a1459c3f81a8477c15d3b5de6c5e78404304235b8822bed13de7ef62be95ff890816461ec819a878cc4cb999f48c537dd536faa1ea9278b6ad64469cb4"}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, 0x0) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) sendmmsg(r0, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)}], 0x1}}, {{&(0x7f00000011c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x2}, 0x4}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001240)}], 0x1}, 0x2}], 0x2, 0xc081) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 222.142945][ T26] audit: type=1400 audit(1553053179.957:42): avc: denied { map_read map_write } for pid=8370 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 03:39:41 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) 03:39:41 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x7, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0xffffffffffffffe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000005c0)={0x0, @dev, @empty}, &(0x7f0000000600)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x29a}, 0x14) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000180)='.\x00', 0x40224100000b) sendfile(r1, r1, &(0x7f00000000c0), 0x2000000800004c36) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) getsockopt$packet_int(r1, 0x107, 0x0, 0x0, &(0x7f0000000480)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={0x0, r0}, 0x10) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000300)) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0xd1, 0x3f, 0x0, 0x6, 0x10000, 0x0, 0x0, 0x1000, 0x20}}, 0x43) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000240), 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000580)={'bpq0\x00', {0x2, 0x4e23, @multicast1}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000440)={0x6491, 0x0, 0x2008, 0x7, 0x0, {0x2, 0x9bc7}, 0x1}) creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:39:41 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:41 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x200000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000980)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:qemu_device_t:s0\x00', 0x23, 0x2) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='udf\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000c00)={0x0, @raw_data="2e53908f2f62d03acbc4fb70aaba1b0ab1cc5f5318992ee912d559e1b9daca16e3105c45d6a0a498f128818930fa0ed2d3783272116b36f1171711b144e317d5a8b83a3b77851e1c17cd2489dda1cfe6ecc324c3d33b4a5d8d5ceed103aa39ad9ead7b9efd995c2a59e8a62809effd4cb44c45e33aef5037d50bb8585f566d5258706d9513004bc3309f47a1459c3f81a8477c15d3b5de6c5e78404304235b8822bed13de7ef62be95ff890816461ec819a878cc4cb999f48c537dd536faa1ea9278b6ad64469cb4"}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, 0x0) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) sendmmsg(r0, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)}], 0x1}}, {{&(0x7f00000011c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x2}, 0x4}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001240)}], 0x1}, 0x2}], 0x2, 0xc081) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:39:42 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:42 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) 03:39:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:42 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x7, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0xffffffffffffffe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000640)={@dev}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x29a}, 0x14) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000180)='.\x00', 0x40224100000b) sendfile(r1, r1, &(0x7f00000000c0), 0x2000000800004c36) syz_open_dev$video(0x0, 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000280)) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000300)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d1778ec44e8fbc1457279ea5f4f272f6"}}}, 0x84) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:39:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x0, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 03:39:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x200000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000980)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:qemu_device_t:s0\x00', 0x23, 0x2) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='udf\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000c00)={0x0, @raw_data="2e53908f2f62d03acbc4fb70aaba1b0ab1cc5f5318992ee912d559e1b9daca16e3105c45d6a0a498f128818930fa0ed2d3783272116b36f1171711b144e317d5a8b83a3b77851e1c17cd2489dda1cfe6ecc324c3d33b4a5d8d5ceed103aa39ad9ead7b9efd995c2a59e8a62809effd4cb44c45e33aef5037d50bb8585f566d5258706d9513004bc3309f47a1459c3f81a8477c15d3b5de6c5e78404304235b8822bed13de7ef62be95ff890816461ec819a878cc4cb999f48c537dd536faa1ea9278b6ad64469cb4"}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, 0x0) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) sendmmsg(r0, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000b40)}], 0x1}}, {{&(0x7f00000011c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x2}, 0x4}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001240)}], 0x1}, 0x2}], 0x2, 0xc081) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:39:42 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, 0x0) 03:39:42 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000008c0)={0x5, 0x22e, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x2}}, 0x6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:39:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:42 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, 0x0) 03:39:42 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x7, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0xffffffffffffffe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000640)={@dev}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x29a}, 0x14) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000180)='.\x00', 0x40224100000b) sendfile(r1, r1, &(0x7f00000000c0), 0x2000000800004c36) syz_open_dev$video(0x0, 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000280)) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000300)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d1778ec44e8fbc1457279ea5f4f272f6"}}}, 0x84) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) 03:39:42 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c8, 0x0) [ 224.591905][ T8440] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 224.662783][ T8440] FAT-fs (loop2): Filesystem has been set read-only [ 224.892721][ T8437] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 224.905285][ T8437] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:39:42 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:42 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x8) 03:39:42 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000008c0)={0x5, 0x22e, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x2}}, 0x6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 03:39:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0xf00000000000000, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x4, 0x0, 0xffffff7f, 0x300]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 03:39:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:43 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) [ 225.190662][ T8495] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:39:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:43 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0xffffffffffffffe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @dev, @empty}, &(0x7f0000000600)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0x27}, 0x4f, r0}) r1 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x29a}, 0x14) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000180)='.\x00', 0x40224100000b) sendfile(r1, r1, &(0x7f00000000c0), 0x2000000800004c36) r3 = syz_open_dev$video(0x0, 0xe15, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000100)) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000280)={0x0, 0x2}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e24, 0x1b0336e1, @rand_addr="d1778ec44e8fbc1457279ea5f4f272f6", 0x9}}}, 0x84) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000580)={'bpq0\x00', {0x2, 0x4e23, @multicast1}}) creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f00000002c0)={0x6, 0x100000}) 03:39:43 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000008c0)={0x5, 0x22e, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x2}}, 0x6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 225.262688][ T8495] FAT-fs (loop2): Filesystem has been set read-only 03:39:43 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)={0x1}) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x24, &(0x7f000045fff8)) [ 225.491717][ T8487] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 225.521437][ T8487] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:39:43 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:43 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x10000000044000) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x1) r3 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x30008) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r4, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 03:39:43 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000069f437327302cdeab07300000000ff02000000000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ec9815dfd09cc6a3b392fb96cc7ce1e4e24d1fcafff87429e50b3288172592b55a7e2f6653a5dfc27887cd2ca2725340d917266c815cb299e6e16aa8fca2531eabe93bbae2627d5b42d1e76e65a4"], 0x0) 03:39:43 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000880)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000008c0)={0x5, 0x22e, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x2}}, 0x6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000b80)={{0x2, 0x4e23}, {0x306, @broadcast}, 0x18, {0x2, 0x4e24, @loopback}, 'vcan0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 225.789038][ T8526] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 225.797677][ T8526] FAT-fs (loop2): Filesystem has been set read-only 03:39:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x100141042, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000240), 0x12) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x9f}) 03:39:43 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) set_thread_area(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000b00)) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f00000001c0)={@local}, &(0x7f0000000200)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@empty, @in6=@ipv4={[], [], @initdev}}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) [ 226.015275][ T8523] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 226.040039][ T8523] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:39:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:44 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000001680)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000000000000001000008c10cffc73ff3762de0668b667245a5ed9574d788e67917a6aa0ed8c0b51fc6800a024f71c9fd49ffc314d5aeeea4a583951438c996a3ebebbbfa6d52ac79992ae69ca4e234e7ef07ae89920f8bbd0e435c1a748a63828425f7b815c722da8bccc852bd01649fb5c1602906b72c982e8232b1b0fed890fede82c4ed48d1805075f8f5bc87dd0f5821b7eef5a2f530a98e20ad8c0ee9b3115a60ea9f678d0ab5742a9361bda634ae8babd6973c515acbb33ec06334ed3140dd7b53ae61804482e30163ae814db2bae87ece5d02b0348a8a3e81da7414333a5e10859e8b515ae222eefc5daa1ca5e33ffbe18f64d964221fa008cd2a9a62677a07161302053ef0d289d2addb7eea4846854393e9cbaa5f92e198fbaf23c2e8e098d6a124c3fac17f958c55d59c1b9da5c98c718236b047776ffcc44870c5fda470c2c73baea631667730c27b87260bb5277ccd9088f867cee4b96d41ae00c7a83185a8ee0d4c71670aaeef9409d6389d26cf15fa278763e2db8cd81a556d5ee5a7d00568593215836140bd3b539af2e38e9f6e072a064472f0c8561fb91f8a849de4e8c0e83d1f677768196410ed04774de192f0902bb6fd8bdf6e0e3207f3c3feb6211db2c5861d6009606fb4579d06b4ff77bf9a64983e91c94bd06ad772604251f36c8e80a4c88fc07d5d4c0146c3e216f163a44664aa193a899bed85d33ca8e333bde48bc5b604f47ef62145f97588c0ccfb9f40ef5c0e011fa926f2870637ffb544e366a0a6e453e3de3d0b139ec9db8d7e87ee23bc70d32673e3b651fcacef4dc421df28541949cad4aa50a27c9352bf514b1415baa702c603561f0cf60ff0a256e2aa4138dbe4809d35142eb81ebcfc2b23a33a06ebe237d60d117cd2abff8fcb09ee177df51b0ea2179f6d120a8d8ee40cfeb5aaa79a1a53ef4f76beddebe21a80b3212b1f95aa8af7a827391e3ff4647de6706b71fbf27cf6a512fc3f63a8c5db2bf88f5048d0d2ade7d963ed056d5db5d147c8df110838f0a3262fdb9238594ffada91245e4118dfb2f93a4f3804f8ad281ed5760bdf57005d5ba7be717e7e6e59ca8f4d8af83fd09c118f03301f9508a04ef47668395c27721374c927325d302233f0cfac926d5bd1eb05d4950275896de0ef28ced7f811675924245856ded96a0102b8de8d3319c6e65dee3c44272853fec85ce664553701daa992b654c4804bf6af9d44de34edae559239a3da6e01424d22c1c793a4602e04b78ebfd1b015f522cf9341c7c3e1aac7466f1d81b68b5155876ac9537f781533ede4d1b93d9a3e553ceb6a159179fb049e2bab8c7b12f88205e47cd7488bbf4058cec71df1a0ef5d8b0a61800c432f3249bb455dc04d4f1ec41c3853364ffcdd7143e26dc68fcb54a9099c5c6bd3f396b4bf49a9625f846dcb597a6e0a386a47972f27f8ed25bc9f863d8f7ff04404d4a98941721eaa2557466ebb892a37c4500035345dd25a9ecdaf0de6c7fdb3c488d86440e6ccb1d850c5ba1b7cfd34de322d57d80190f63e3660afa61c13f9583b3b3b15cc0b254e142a4d326a7ab8fd038f4121ea28b2fe0a03ccdbdc859b2077537a6fa1f4157fa7f4a0acedf53774b49d91eef8bdc4b1e93186a5a5c0bf73ccce830c3e69ae39a19392b9c5bb7a33977425bcd1b395a3a57ec1259dfdd01a81d730a4330441bff8fc4fb17d7ba076e1049ece026f2564216dea651a1c6cba675f05bae24194daf6496d32379d1dc001de494b0057ae64bd03ef1ada7ac5ad1ee80ec2d67ab53565fc4313e04bbb4aa264a0a1643a1570bf7d51040555b26f9365d7139c76d3961801723ffc76955701040d32174d4a92b4a78f4f8e271211383d15a29203a392579cc0062fc890d9f4547a9c9a36b78c6985140b345cb03e1881655cc0aeb91503ac7c8efd1c71450fe9acb9843a64efcd61a535624b06ca8c16cf60b6f2d8f1f2806bf6380407be95408aacbcd21649606791331a49d7127a99229454722ba59111f06e9db73808a7e126e9eb07d3af4c5a622ffcef72609175a079e40a07947c0265258ac50faac4248d8578c350385f86311de65b1a06191ab8793c03a16296e3257e197a3a7161f61ee77af836b79a999b35061937e50670ebcb018bb903ec27cd428a4280098af3b9b80070b90a72416658b55a36bfe8ce102d1c7722a776a3ea284c911502c8622ce5054d5631212263023c4f95d790cc595af2649c5966c0dfe275ce13ef927c2f736911cef84b51291c71f3bc278eb39e140ef9cb2557c30f82156cb6f7d537b96e49f65b489b413bec7f412145fe993b2ed83e6fbc363c1d3e5faa1f56dac15b2d33018196a0f06733e3ebc88097098171797eba671f1a731e305f18193fc26124255aa0621640b80c82871f6343e2f6f2f50045e7d9899cdc9aa5dc85ffd2a79a9296f8019838de31ab25e5870e3e843f798e32f82cf0332f132dcfde93ab09a126f0c59aa41d98db4ec8fe073ff4f24d511931e85b3d4350e0805cdf692c2dcd7ea73f5e82ad4d5b305a6d01d0bba7eccc4220b206b1f2d3c455d127c487890434b94b7c61de1d0f36aa285c8a9e649a9f5a0fa7b5da0769b2a0c9496d55dbba5d3b7b32d7914f05ee2e5734f48e7509682d4e5e9c3f54f25e246a8a92a8c714d7c7dc5a5dac4b45d52d9c635a1d71385314983259fbcb427c12d11463c57bab5571bb4793e063ed20d6a3d933610696fc84b5ccd501962bb8210b13fc3325a77ae08d20aaa52f31c2ee6fb41e82cfb528f3dc1f5cf0ac8b2d59e013497ebeff179170589ccf335e8d7b98ea82043f1635a2e48ac798db41119fc7935fce334d68fa304a67c64f6e2352a656ac948c269276d195e866eedd4524c87e42cd6d303062f0ee55099611d7763bab60e7c2d8104ff521366e4110a01c8a803847dfe93eee5bfa327cf0c8264db472373aef227e7f2abd7270b598077d61c2e615c36ab3d73f1618a1a518f57bb4a5612a9865fcdd44f62681594f76a738c9866ae72a639edd272cac6c717970cbe12e8cd113b5ecda94bc8a9150933b5ebd95cd2fbd77f8ec38feb356cda7087c37e543b7f17979614db3c363dcfeffdeef3a5c8d788ab8bc44707325a515734652e6fbb53b1431d86258540379381e370b054a6f4ef65a49caa8981f74b99d16264f66ad1ea936e84b19e7ec66500f1249eaf94822f20e337b84490a44bfcc06e6bdd2ec639c7103701cd8ea64b8c3c4bc9764a10ebda1ea1578df69e3ed9b1c91f7df99f7e61ce8e0c0fca438b8cf87d3e44f197dfe05c7035fba9dca9ee314a7707b66f3170eccff954c2e27b8ebe8589fc0062dfb6c866ab274be16b13955bd003966a3eb00a69832466f13b024ca3752be85c8b059ef25b1de7e1581a7593f8b894ebb8044b691beb8cef8c354b4d152478105ccf1693c62d989c7fabb97d94bfa67bf0787909213061d197e7041d98dc0fe053ce4ac38eef2c951fb4624d37daf65e5a5d9175883d56573c97ffde8fbae008d02e08c360ea3a9e896c48191287682c2539e8c93c663ea8b978ab179ebcb120290647e8c3b8dd51d3d03d845aaf18044a7b7cb087d2a64c275caeff319d38a574429a1ae153c1abd532887d34f6729da0289b13706155a973dddbe6610b6deb199667585bff44b21b451ba19e813555f20d2908e9c3b0bbf5a66766475b3c8cfed474934b5d4aa417a6f4284fd1bf6a8a4ccf26ed1a152034b79a7a87a6d799716dbfefba1d8583699fbd02b2f2586a618b57b1583f2ef2e320c2791775b727d99ec3ef91eaf70f54677c6fc1c316a0f84e7bedbad286191356c7e7def1f551b86469db943b81f02852325b3041626eae271ead2ba38424ff9241fbb3e54d9d98483003404e046eee485612c75ccb1b679dd8548b09ff43d13f582175e48340acb4fd78b471d31918413c296bd93cc8b8bf1a2324f9f6ac40d0be302a2386a1afd640c4b8b92cf8a35cc1dc6fecf0eae892c8c0a0228b542db8a238d2dbea620244c5459cf159a142443f40dcccdd587e881b18f7dac6aab30c69ba5032036476d644e24d7a67fbb7b514d244752176540f0c7560da04963154f2bd9f99e2ab44a8ee27b4e3b853f9e581baf8814555fb3ffccbfe85611110621cfc47a38a384abdfc8cad021cd7e0146b3a80cde4e898c66dbd4353cc729d12ec056cc226f656c0b5261406b3f12ca9b197ea755b3402c2ceed00fb2dbdf375f6a786189eee744d1979ca1385dd3f742639b348d005a2e3b24beecc3d90a33a966b36406d27eb7d309e8124a67fef8abdece01b6073b926bd1fa816436a001d5ed4067aba8f970282a812518e1661a31df50b2181e1fe414bc8010f106890a33b51964ff5c019f15629aadbc014c076d1b5c03a07109cea0e01acdb991319ed5cdefd8ded065ec670ded1d42b997af091c36969374ee0f387cbb4f3c68f5865b546707c1a96b9ee29eec92185d9c8b9d126b4113682d4dfbc5e89098c2b30d5cce3c5666d5feb629858cb42377c562c03ba7e7cf97d4574c6e6505dbd117e487bb396bd5ae3bd0c59b81a8ef8e419913b3cd62c2cb14326e7a2412a26e7a9c723393dc10fcca2c1b2890b867e975cb178a89adf83007acbff72b9f80568fd02ed3dae6b6faaa365d34335e5db92f820aa572f4de06676676beb70083eb9d5b7729cddd66c18d82301525b2a076bbc32788f1669e969b6b5b0ae4c97768da8a29fd1da58bf19292e448b16067dffb1e6b602ae626b5c5df145e133aa1f925418974799437bb3c49963c3737ff4b2545517c8b73956a5c579e994d7c7816c6a3921bbe6f00ae62420b73f85e1ec6aeb194124336067032882afca105476b3926bf1a3019f7339c799255950e3aace707015a8b0a3beece7067b8f3291edea89bfe753ed82e16f538a561360b75975c7931bbf28b733aef2c982ba921e2429380c4fdad5b8d7705a314d9b85f97d20cd2b811bbb83170a0c9e8db00e6c978ffa78aebf4c2418cebd7658ad74d5d0e67d693c6d0b9353087011221797025879a5e5251619564436272b8e80f124fa6a62874e5d11390b6fdba610024d89e7fae0b3daffa8b5585db6cf2f7ac1d174b501cfdc5219ab5e61fddb7a3358549721394751ec431b8a57da8e8fc606d92a0e1d11057862f9b734da82b90bdab6eaf4cfb32a1d4372c8eda84722fce666dee210882f2ddd68d1092870e9b94e964a7c0e276bd874282180f47fab5aa5d16936296420b2de09af0f23d69bd234e9f6c4bccd4e12369da91db257e54c645d2a68db1a8350bc24d0c262da560b072747b1da7cd98b3c434eec9d1cb74bdb18f8ede2093204ec0c3bab501690d7a51224aef5990e478229e2036ca4f658f346e9edbcfd332c3c45a25d42835ca80a32e74f2ef81cd22a65761015c9c93da58fe6720be121fc424507875d0ecdcfaa180ca33286c18c1f2106ad318d2f1c88cc2143ac595b74df2bb5d229b641e973c73a72b7ef0d8bbe895502c7d01eb01834e78f41e39f813a238200bf467a00cf449200c590ade34fcf128f57dbd41436e122a726474241862cdb7fa358f66e935cf48685af5a0a859c81fa386cfb00bfcc95fb62c42a193ae0857f713961de04c464bd4fc1abbaf559bd74a9879a0e52289c4a19d395064b8d436f969becbd14e5ca95a1fdd66941c70bf5e31a1adcecf39232cb1ba10deca347776e4ce6c8a051cb8a58d4ad34a460450244756fe0ba50e0951e0a42beea4015ca0ae73429e9e03173ada35121ae1d6c24c9aff58814edbf1c5b3eed3668de219e1edc035a0147ebf6de8a924ed3d30000000000000000"], 0x0) 03:39:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 226.108806][ T8523] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 226.129375][ T8523] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:39:44 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 226.183664][ T8522] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:39:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:44 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000003400)=[{0x6, 0x0, 0x0, 0xffffffff}]}) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/98, 0x62) 03:39:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000003400)=[{0x6, 0x0, 0x0, 0xffffffff}]}) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:39:44 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 226.761477][ T26] audit: type=1326 audit(1553053184.687:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8581 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 03:39:44 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) [ 226.861184][ T26] audit: type=1326 audit(1553053184.727:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 03:39:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) 03:39:45 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) 03:39:45 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 227.439575][ T8625] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 227.449289][ T8625] FAT-fs (loop2): Filesystem has been set read-only [ 227.469342][ T8622] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 227.478109][ T8622] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 227.511611][ T26] audit: type=1326 audit(1553053185.437:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8581 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 [ 227.543950][ T26] audit: type=1326 audit(1553053185.467:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8580 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45aeda code=0xffff0000 03:39:45 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:45 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:45 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) syz_genetlink_get_family_id$net_dm(0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:45 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:45 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.evm\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) syz_genetlink_get_family_id$net_dm(0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:45 executing program 5: 03:39:45 executing program 5: [ 227.681265][ T26] audit: type=1400 audit(1553053185.607:47): avc: denied { create } for pid=8631 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:45 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 227.831239][ T26] audit: type=1400 audit(1553053185.607:48): avc: denied { write } for pid=8631 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:45 executing program 3: 03:39:45 executing program 4: 03:39:45 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:45 executing program 5: 03:39:45 executing program 4: [ 227.998259][ T26] audit: type=1400 audit(1553053185.647:49): avc: denied { read } for pid=8635 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:39:45 executing program 3: 03:39:46 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:46 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:46 executing program 5: 03:39:46 executing program 4: 03:39:46 executing program 3: 03:39:46 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:46 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:46 executing program 3: 03:39:46 executing program 4: 03:39:46 executing program 5: 03:39:46 executing program 5: 03:39:46 executing program 4: 03:39:46 executing program 3: 03:39:46 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:46 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:46 executing program 4: 03:39:46 executing program 5: 03:39:47 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:47 executing program 3: 03:39:47 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:47 executing program 4: 03:39:47 executing program 5: 03:39:47 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:47 executing program 3: 03:39:47 executing program 5: 03:39:47 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:47 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:47 executing program 4: 03:39:47 executing program 3: 03:39:48 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:48 executing program 5: 03:39:48 executing program 3: 03:39:48 executing program 4: 03:39:48 executing program 0: r0 = socket$inet(0x2, 0x0, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:48 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:48 executing program 3: 03:39:48 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:48 executing program 5: 03:39:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 03:39:48 executing program 5: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000280)='[\'posix_acl_access\x00', 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) write$UHID_INPUT(r2, &(0x7f0000004240)={0x8, "a4695c532a8840cd6fab5414a4526f2c79702ae7d3c6501814b0f7c64161e134364c387ed362863f529d0903deef786d215310eaa4c13c41250db8794e3f0bf1be5e5d1aac357c8b6d3f43c2219de07cd2219aa3c3f251252b86ebd758fdaf0e156ad88b2e624d1e405363aebe4aa0f31ce7f0e51706273ea3b7c2cbd7d77d314a4adb25485c5e5bde9b998ae95c0581836fa841e241749ca8b55b9c4705c4a8714bd7165f7d0999adb658a9507fa64c7a41e58fc346dca457710f13e9699b0e175c7523b55aa74a54e6cccfb463a2d6a89451f85ebd962b042418e5cc266abd4f41bad18eb2639379b55aaf6e89d92d01bfd995274711f8e72094b45a4b79b0995e38b28f6633237f105a7ec050896f833de886c1d31e3c14f48ba185043d7f3ee7231fbfd2cbd31ef3454027c26940714dca40c74dda73812edb9d2adc7354ce2633aeeadbc6c14e169d994d7ac1b68043fc1b3727b2f96706da8c3f3b3771d5beba69188fca57852785f46cb373c19a3374d8c041f92ab3820d2a1eb525237cce0f7a99e0c66cf681e7ea950e062cfaf0e8d8d834da0443703ea2b63568d29cd2d7199b6ef6784e0dc8a8979841d4ddea77b998619e8eae45a9ea9bb1464ad2aa2df228e60a65b5e83ad369bc367b69a8207d8f0904b4c389c973ec705b73b666e2f298d10f57f098ed0af810231358dd151ea5bc03675bf1c9fe6ac570ad628152c8a2b8570d849c8a0460b617fabda499cd10aa0e366b8320e14b1bec56c6a96165d23b9806c0c4f86d2d4677a95a6c0e627aae99c235b06bf1432e7c81dd827e43fff9ecd24f7531ca4cfacf478f66ed764fcf53d773f4b9abe8185a661fdc9727a478f422a4bb1a7edeaf68b1e2ffa68e3068a7de077cedc7554de7a90dd2b2483a47814cc7bc85eb1a972246778db8b33bd522ec79aefa3529a000c58b570b940e55c0484386325f4097b13bf337759b0bec9321fe39e521a546a7563eb675a61ce680dee112f368343ca56332c28f44f95024ae1d77b411abe6ed80c645ce69daee65e2505d13b2d0f2f1dfe35ea7c5340c6eb70c4c34350fbcb9945e2ff4759baf55b01db49b1a7d1011eaee4811150e7f5caf7e93b0746efbc52f5733c74e27b8f4631d3852d544eef295eb18a2bf2369679c2bd9a9c5939803c6ea153d9c15dd4112789060da7b1d5b7e41b718a68a10f1d4f3e3298c16c5ab69a6c7187ddc82f2d3e8cd737afb7187dea3076359fac2b40917305d9f831b2ea698051f6560fc3cc6d24dbd148abe8e58f7d8127a9615ba027aa35aafc88debf06dab3ca38e01977102164747b0eb568009887342bbc14e274e1d12729b770887f9aea18d2ad6441849842d51d41907428ab28e36e815103360ef3c121d5a602231413d2825c0bc1a2f04614920b113e871ae1da79eb4f3a8528effc9e738c48eb2ba7843332b85bcc4d4f4cbce5090967fd6e88cd63a3d03f5c79f36ccc45be3941b3b39fb19e51298b8671930a5772ed878b057572b6db8ece6ac3f46a062a8fccd0a3b9133c0573419e3a2d5b7ab5ca40033e35918449d04428ecb9febcabeff937fba5ee21e75707de789432ec0680d3f952927ebb85e5609aebf96e8c84d88056d369493c875ce0f9e8ae5fac48912a7689914f9be71773d3f004306406cdb761c127382e70a77ac6da6aa98d57a575b218b72e2d90a66bcc130600b52765da0b017bab0e3f3e3689cf1220329ea86a03cd2f6d2b54c95364c839ebbc315153dfbc97d6961d7f0e6db56a93fa1d7afeaf479fe47ac35c92a398be921769f3f7c422cfd5ffc372f85ee3f619974b8c627568430c64d84f6aaf69a1276a7cf4cf57c057257181f15e82fd37271278da6235f34891fc702894cca12001e263d74a6e18a45bc0ebd1600987c3237804507a4923f4700ebcca3684ef35f8e4c0a8b9875cf92aec862519f5c0cdcb1d5b90710a88d39bb919c0820f25685085d179bd48ebce21c4ed697a9def3ad887eb4652ac5919ffb2ff34e78d53123e9c1ae9e50447d77560c3702d818ba1e9f848123f31ca6236457daeda138846b55017b426fd8fe0e65b5c1d8d936bda2e7e9f67ec0faaada6ebafb2440071f0c50aac2f0a5059dce32998799524bd6412c13bbee27b891de386bdc7b4a96a3e495300e82ec8d837b95b9af4b1171ea7640a27f27b3befeed4b864b5442f889b769206d6767b5815a74df960824fbcab31ab93281db2b651a838b790e52fb4c2ed29358cfe44c85f5453af706eb96ebc3140697eb914e803f3965614c15ca7fb5f6c632007fe7c56acdbdb0a197341d44f024cbe174244c0acfb1bd29f0d628d037956ad4434aa3a71ecd29556f3a23fbfc3735904c2ce5e84fd53bbc43e924940f307a81706556c45f53630c311aaae9ce4565aed2339d95bbf3107a90a3b8a6e95e8415a2ae7b8841dac758d52b7bb22cbe0ebad79900e9c7c40cca8799cca66b3571fbecf68e3ea2e3880bc2cbed1ad1dabd69593e1a968da410c5d8538fdc8199ee310a3a2b14c642e388e9f1413bb90f876aa478006554a01f6b0d41d2f5c8b7ff20d7cb79afd13f6ab3f1331a8de154a60da33aac5310c174cd54a79985772fce707da4a9ce7c5b7b60e9a9a58cd0aa4343c45d4acca17b04214076800d3ab346142ebe4bdf3c7094e73a552b1929af8c5a5603188cb751b35a98314694ecbf71c05e7997a322eec7a659c44899f7c53c8d3477d3c36f21577620813b41223aabdc72d772a2f60deb3b55bf1b5c1455371f14b0ad57af2cf6cc5b25793935d9d1fe24a2c54b5d1e45b0d69c7f697ba26595bd30e8361adee3e84b2bb08410435ae348947b1c389d5bb5a97b4654241f9b9bc07d968a6d963200e0f4eed7dc80780dadd6b570a2c5a6e9dd93712e6103bce24db15d906ba03085c06d5d963d3452f742a386661b1679f9a2cae3b9debf35c01a82a5e869cc63aabb113f6a37a3454b134108dfec975ac6192be9c699321ef5280e82e13a58d6c6f68d8d3abcde2d2fd047d8e08650c715932bedc0afbadbfad32dab976687c4d7dfc40d95399716f410d75e8d6b4e5ad85562e5604d1e414cecc3941b2e9cfd1aa2a6f31b2d509420dab96d19fe6627420c0c454f48b9263d2af216ab0858590005d57412234755b706da1a7a145fce8e007969695d00bb462270ac95fd1b483686ff6db7ffe576a8df61d80604443452236e27adbb46d4a70f2e7ccbf1735a9e9fce0f56859fa00c011742f5ded1a3631a8addbd1c412f4b404a6c7164b33f378c95395b8ce6185f90c93a9f6b33f905b03c2089554bef2991428d4d2b27e001926e714eef50ba21b7a9c048cbf2d72576a82b1145f40c9e8a2dd79684fd5c3319a8076b5f88632930542348241ee0c0b737c9474a4448d2a7d1ad2d81a5bcd4566520b678aedbb3c54cdc7dd6d03bb60af951eee9dfa5b92ebd2b6e4edf1cae7feee75c901b8fbef195921076aafce7c34732c3c67093587e25860e94028768b98c1980038fce54fb76d2531b9c3f945630ee9ec1afa2acba1e66d2ccc8b966c0470d5528cfc119c0ba14cf84c5c2a2fbcf99657c3c73ab20b32547275bba54d45eaf49e86622467e82d173d8dcaeaf5eba2a24abbdbeb5bcae6ff222d49eff8994c31297ee3f53ed0595ca90aa6315d30cffb5fdf27bd68f78ff547d4e1b443161c130cdb02f38bd0c5fc5eb86dc8a7cd9c3956d8aec7b9f4d342edffef3b819657f0891be01b974409e7a5b2ae63ac68bd7696e1b6ab1da8ee48ee955a3a12d14ce067c9c3c8b752e37c843fa9f5e9f3a1fff75ad6ff6366b34464a397bf6c74a6488912f2bb8fb379d1806a9a635d969b5818eaf11b7cd7377cc684d71f3745082efa2f49f64a057050c5f5c171b93a64dc93bdf89a181a70d38dae0731e5863c62735d7a4b28419abd22126a00fc9a5a75a74691caddc54d5426b81df6448efebc6b5105c4d648dcc23ae4f9ec7611aaef8030ea44d38952dd9cb32ddb484d3cd4e6b0174c58fd7288352f1639f78f2fd2113523462c4999a92e5d9e0ea1541c3ff9b749b5a37687f0499b1a13fb2590f7c76a1573f673ad8503845257c588c3049350e97ed93e24312ff82620d42f7229c4ac1094203e0b2022e9a6173d000e7644f867bfb7a142d4fc2e35a54de4e9e23516cc5cdce027b62ef24fc32cd10890e4f2fcf26a0f7b40039225ff19ff35ba97d9ecdb6e6d2cd211663dcc0dee1d41409f2d8410bf0bc9ceb490d292a3d97cc34ebc647354d8487b21c306e80b45dc57816924fee5e24e30915967e18a952b007da91d270af88fab23dd420fdb102387503280d436f644ced6868a2ab7ab2b1374969db72ea9c612636b858547a9bb187d2639fc30be948760bc634e572718efd0dad2fe4f6aaf44b0c5823e6854726f1d46bf41dd8691e58a77bdcb9afa63f3b0e1fbb0e5cafa7605406769d62a3f7e399e7d6c138adb02de7f4843783b0dc06f4c4539b02d565e79e81eba20609ba8a8914f74899ab42ac92b03580cfb5e457ca5d0b747a69ab9edd278cb59f7e6bd381a483d92dc866e9ccaf780b91a6f6993bab6f73d52593fe2cda79561ffbed677f5742f7844d284cfd9da34cb64b423073a4b3cff07fa6f18eea3a3ef843146870763c766d16c782517acfa89fb3d273e70dc8ba22a56f1d840c5dc87c31e4df33938c0a0dc78ea35872ae89b23290e786baf581ba3bcd995e5bddf22e6a54a6d6ae093278f6fbbd3e514cfea144d6901073e547d143c329ea2a1f97ab9aa766a2c0324890c8cb1aec1b21c88edfbb8f0d814848f31bd4a0370cc3cba4765c50975c8349da805df6fe1b67904b5aa70687e61f6bef1179e30a9b795704d11bdd7aba532bc48528574a3dfadd9f281c0cbfecd991e32c901b8d7cc57744ce5158f2259473f37e025c3f1ddae6c51cf50c2bc10bbdb17d01ac0f4807043cdadb0530283e52b6e82516603a1d7079bb45ae71c15b23a9877bc2ae706da4331b9ac9ab6e1ec8fd4041894ce2c989dc1c95802e3d443ff2cf05ec7e8348df32ae0202420dadbf6e23de917c76ab512426af82adea7a5fd72fdef2801851905ec73b83bfc8c6e63e572616a687851b8afa9e3f6c1ee357b6ffa917eeacd1005c67bced235f61436cb44dd9bf6842c8ea5ba281f77531e1d08a7a09ef0c19d2cac655bfb81ac4b7ad40083d09d9b83e7d56ada5b972cf6ee53ca693af576fe22cfde1796927aa2b54378884a93e80ecc992cf298ba99e4ad5b9d135af6e237f24c519f078b30ab1fa028438976935751d840a6078ad33f1229adf5663b5ba3c8abcff8ff30183446a62aae8a0937f8bb418e0d0c984c441271ccfc3984cdc23793346cfc36809f5ceec330e73e4f13d5a17726526b6e39931a8de1fb1d998680747f01724b117710759b9d29bf68fda8529473eaeb28182e502220a6bf5cdca4c118d2edaefe1ffac007bdb8f246407dba1f7ae277298b765e448b501e1c57e5f9e620fb6a894506d7e81fa92bd5571b32edaa3fbeb1a84e9dbd2d2e61d31bfface3ad615837f3fa95f2ed37c9e96cc045baedb79ad9c7ff37bd96798e6cce6a8d2fc8453c3a44865e1fae5e5fb551126038ef2ed4f6f7b6e186072aec9d62b8670f972eabdf12f13a1d3be51d037b25ee0552772c1fcfecccfa2bb445a34daeb79d4a1bcfbf70e718091dd72ca46069731c38775136d7256e445b58419ea845dd0f65a8a1daf88c750731a0092297c4c964005bc9cf9ec215f07c18a395b350cab70658bbb", 0xfffffffffffffdd1}, 0xfffffe48) sendfile(0xffffffffffffffff, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000002c40)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r1, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) shutdown(r1, 0x400000000000001) 03:39:48 executing program 0: r0 = socket$inet(0x2, 0x0, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:49 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:49 executing program 0: r0 = socket$inet(0x2, 0x0, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x80000004e23, @local}, 0x10) writev(r0, &(0x7f0000000480)=[{&(0x7f00000018c0)="b54c5d89811dad5ce07b9577b9593c06e5a8381beb750b0d54bf532aacb2934b25154bfe3cbe970b339c87e8237a77d2ac574d03f8f26df1bdb7fd3c8c54d400172b59cc632bf9dfecf0a09005c550a1cd886f46136f5847d22af458369b37657dce1c4406d01c7c57facb458baee95923e0753d912497a9d279847af3233ccc595aa1f3b99c3d3b3ede336a09847180f640ad16aa68dbcd4d10d7fe8b20c86686144f88d7f58ecd6abe57652f9feddddf7ef2498ecd017e0e2ec1f2211ea8dcfba6ba455148960431", 0xc9}], 0x1) sendto(r0, &(0x7f00000001c0)="0af9a845a41476898437ddcd9108efd829fceda99f016c9b85b1a37201efbf0a51ea350d103bc82af02d592b2f160b0a3a4a2ef51949b7f8fba8c291da565b6699a92c5e4f21745f3b2d620e474ead1e62974ee06a88a278e0150449bdad3bbf3f0ccdb8cbe7b9a16f0772e912851cd069f4c0e991758b", 0x77, 0x0, 0x0, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)="f0d956d7e3254f348c393590fb359e07bbfc14439b96636101d5c8b0dcf3ffe817f3f5a12f070d946367f0d39f53471fa8ec3a6d4c9d9d08b660a30eaf2af1ed86a9fe655c2ffef817fa35cea26da2070c5590853ed865bc03185e3db81f5539582cabe8685dd763249028662b30f58c0da0b3bd82f474032cfe30d31937d7cba52f44a429c7fb3ea21aa71b171b936cb932904d63311af80f80c289643cf34e149bd2e9affba921ef", 0xa9}], 0x1) 03:39:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) getresuid(0x0, 0x0, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x40, 0x40) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000180)) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r5 = socket(0x10, 0x80002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) bind$netlink(r5, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r5, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) connect$netlink(r5, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r5, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="ef4a113e3937b2f7d979f2973f8184b8d5d93a926164e9f09a12f54397f4a2fb3c105373556630"], 0x27) sendfile(r1, r4, &(0x7f0000000080), 0x9001) 03:39:49 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000007000000a308000000000000"], 0x18}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 03:39:49 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 231.446446][ T8801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8801 comm=syz-executor.4 03:39:49 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:49 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:49 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:49 executing program 5: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 231.817055][ T8843] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:39:49 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 231.979018][ T8848] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 232.129520][ T8848] FAT-fs (loop3): Filesystem has been set read-only [ 232.312674][ T8828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8828 comm=syz-executor.4 [ 232.363650][ T8838] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 232.376232][ T8838] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 03:39:50 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:50 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:50 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:52 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) getresuid(0x0, 0x0, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x40, 0x40) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000180)) r4 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r5 = socket(0x10, 0x80002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) bind$netlink(r5, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r5, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) connect$netlink(r5, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r5, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="ef4a113e3937b2f7d979f2973f8184b8d5d93a926164e9f09a12f54397f4a2fb3c105373556630"], 0x27) sendfile(r1, r4, &(0x7f0000000080), 0x9001) 03:39:52 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:52 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:52 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:52 executing program 5: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:52 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 235.140198][ T8875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8875 comm=syz-executor.4 03:39:53 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:53 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 235.289691][ T8897] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:39:53 executing program 1: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:53 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 235.414380][ T8897] FAT-fs (loop5): Filesystem has been set read-only 03:39:53 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 235.580275][ T8887] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 03:39:53 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 235.645343][ T8887] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 03:39:54 executing program 4: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:54 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:54 executing program 5: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:54 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:54 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:54 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:55 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 237.128981][ T8949] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:39:55 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:55 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:55 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:55 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 237.422968][ T8945] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:39:55 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 237.526816][ T8945] FAT-fs (loop5): Filesystem has been set read-only [ 237.620225][ T8945] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 237.925320][ T8928] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 03:39:56 executing program 4: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:57 executing program 5 (fault-call:2 fault-nth:0): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:57 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:57 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:57 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:57 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 239.121645][ T8957] FAT-fs (loop5): error, fat_get_cluster: detected the cluster chain loop (i_pos 0) 03:39:57 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:57 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:57 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:57 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:39:57 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:57 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:57 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:57 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:57 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x2, 0x0) 03:39:57 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(0x0, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:57 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x4b47, 0x0) 03:39:57 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:39:58 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) 03:39:58 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x4b49, 0x0) 03:39:58 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(0x0, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:58 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x541b, 0x0) 03:39:58 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(0x0, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:58 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x5421, 0x0) 03:39:58 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:58 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:58 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[]}}, 0x2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x412100, 0x0) 03:39:59 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x5450, 0x0) 03:39:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:59 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) [ 241.126145][ T9103] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 241.138804][ T9103] FAT-fs (loop2): Filesystem has been set read-only 03:39:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:59 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x5451, 0x0) 03:39:59 executing program 3: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x03\x00\x00\x00\x00`\x00'}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\v\x00\x02\xff', 0x4bfd}) ioctl$TCSETS(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x1e00}) 03:39:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:59 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x5452, 0x0) 03:39:59 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:39:59 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:39:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:59 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x5460, 0x0) [ 241.854148][ T9100] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:39:59 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8901, 0x0) 03:39:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:39:59 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) 03:40:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8902, 0x0) 03:40:00 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 242.195462][ T9149] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 242.250451][ T9149] FAT-fs (loop2): Filesystem has been set read-only [ 242.406933][ T9133] device team0 entered promiscuous mode [ 242.447425][ T9133] device team_slave_0 entered promiscuous mode [ 242.455366][ T9133] device team_slave_1 entered promiscuous mode [ 242.479632][ T9133] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.566262][ T9136] device team0 left promiscuous mode [ 242.572325][ T9136] device team_slave_0 left promiscuous mode [ 242.578773][ T9136] device team_slave_1 left promiscuous mode [ 242.641205][ T9167] device team0 entered promiscuous mode [ 242.647047][ T9167] device team_slave_0 entered promiscuous mode [ 242.664556][ T9167] device team_slave_1 entered promiscuous mode [ 242.676277][ T9167] 8021q: adding VLAN 0 to HW filter on device team0 03:40:00 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:00 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:00 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8903, 0x0) 03:40:00 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8904, 0x0) 03:40:00 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:00 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 242.924418][ T9180] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:40:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8940, 0x0) [ 243.012164][ T9180] FAT-fs (loop2): Filesystem has been set read-only 03:40:01 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 243.069338][ T9190] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 243.087792][ T9190] FAT-fs (loop3): Filesystem has been set read-only 03:40:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8941, 0x0) 03:40:01 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x894c, 0x0) 03:40:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 243.485981][ T9225] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 243.507140][ T9225] FAT-fs (loop3): Filesystem has been set read-only 03:40:01 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:01 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8980, 0x0) [ 243.755143][ T9248] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 243.763586][ T9248] FAT-fs (loop2): Filesystem has been set read-only 03:40:01 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:01 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8981, 0x0) 03:40:01 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8982, 0x0) 03:40:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:01 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x8983, 0x0) [ 244.301190][ T9289] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 244.309503][ T9289] FAT-fs (loop3): Filesystem has been set read-only 03:40:02 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:02 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 244.614238][ T9302] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 244.631172][ T9302] FAT-fs (loop2): Filesystem has been set read-only 03:40:02 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x89a0, 0x0) 03:40:02 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0x4) 03:40:02 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0x4) 03:40:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x89a1, 0x0) 03:40:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, 0x0) 03:40:02 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0x4) 03:40:03 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:03 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:03 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x40049409, 0x0) 03:40:03 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 03:40:03 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x40086602, 0x0) 03:40:03 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 245.592980][ T9349] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 245.621697][ T9349] FAT-fs (loop3): Filesystem has been set read-only 03:40:03 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:03 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 03:40:03 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:03 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:03 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x40087602, 0x0) 03:40:03 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 03:40:03 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:03 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x4020940d, 0x0) 03:40:04 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 246.181935][ T9411] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 03:40:04 executing program 1: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 246.343026][ T9411] FAT-fs (loop3): Filesystem has been set read-only 03:40:04 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:04 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:04 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:04 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:04 executing program 1: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:04 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d3, 0x0) 03:40:04 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:04 executing program 4: r0 = socket$inet(0x2, 0x0, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x80086601, 0x0) 03:40:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:05 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x80087601, 0x0) 03:40:05 executing program 1: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:05 executing program 4: r0 = socket$inet(0x2, 0x0, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0xc0045878, 0x0) 03:40:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:05 executing program 4: r0 = socket$inet(0x2, 0x0, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:05 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, 0x0) 03:40:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0xc0045878, 0x0) 03:40:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, 0x0) 03:40:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0xc0189436, 0x0) 03:40:06 executing program 1: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:06 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:06 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:06 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0xc020660b, 0x0) 03:40:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, 0x0) [ 248.610996][ T9546] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:40:06 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:06 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7ff, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'trusted.', '/dev/adsp#\x00'}, &(0x7f0000000100)='/dev/adsp#\x00', 0xb, 0x3) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000000)=0xc2, 0x4) 03:40:06 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, 0x0) 03:40:06 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:06 executing program 1 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:06 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:06 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, 0x0) 03:40:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x400000000004, 0x5) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r2, 0x1}, 0x8) r3 = fcntl$dupfd(r0, 0x3, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c8, 0x0) [ 249.137103][ T9597] FAULT_INJECTION: forcing a failure. [ 249.137103][ T9597] name failslab, interval 1, probability 0, space 0, times 1 [ 249.205545][ T9597] CPU: 1 PID: 9597 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #29 [ 249.213608][ T9597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.223811][ T9597] Call Trace: [ 249.227167][ T9597] dump_stack+0x172/0x1f0 [ 249.231544][ T9597] should_fail.cold+0xa/0x15 [ 249.236173][ T9597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 249.236200][ T9597] ? ___might_sleep+0x163/0x280 [ 249.236234][ T9597] __should_failslab+0x121/0x190 [ 249.236255][ T9597] should_failslab+0x9/0x14 [ 249.236273][ T9597] kmem_cache_alloc+0x2b2/0x6f0 [ 249.236288][ T9597] ? selinux_capable+0x36/0x40 [ 249.236306][ T9597] getname_flags+0xd6/0x5b0 [ 249.236326][ T9597] user_path_mountpoint_at+0x29/0x50 [ 249.247178][ T9597] ksys_umount+0x167/0xf00 [ 249.247210][ T9597] ? ksys_write+0x166/0x1f0 [ 249.285135][ T9597] ? __detach_mounts+0x320/0x320 [ 249.290134][ T9597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.295626][ T9597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.301146][ T9597] ? do_syscall_64+0x26/0x610 [ 249.305868][ T9597] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.311973][ T9597] ? do_syscall_64+0x26/0x610 [ 249.316683][ T9597] ? lockdep_hardirqs_on+0x418/0x5d0 [ 249.322015][ T9597] __x64_sys_umount+0x54/0x80 [ 249.326748][ T9597] do_syscall_64+0x103/0x610 [ 249.331639][ T9597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.337561][ T9597] RIP: 0033:0x458079 [ 249.341492][ T9597] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.361120][ T9597] RSP: 002b:00007f9e5316cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 249.361137][ T9597] RAX: ffffffffffffffda RBX: 00007f9e5316cc90 RCX: 0000000000458079 [ 249.361143][ T9597] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 00000000200001c0 [ 249.361150][ T9597] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 249.361158][ T9597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5316d6d4 [ 249.361166][ T9597] R13: 00000000004c6deb R14: 00000000004dc5a8 R15: 0000000000000005 03:40:07 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:07 executing program 1 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:07 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x800443d2, 0x0) 03:40:07 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x703, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x100) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000080)=0x40, 0x4) close(r0) r2 = fcntl$dupfd(r1, 0x0, r1) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000000)={0xa, 0x6, 0x7, 0xfffffffffffffff7}, 0xa) io_setup(0x200000000003b2, &(0x7f0000000240)=0x0) io_submit(r3, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x9a, r0, &(0x7f00000000c0)="11ae6b8f46d4a7ba4301dbda4d1e085df64c468fe44eaaba132d0b0d0e56f36fa694a6294a1921", 0x27, 0x2, 0x0, 0x1, r2}]) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c8, 0x0) [ 249.539225][ T9608] FAULT_INJECTION: forcing a failure. [ 249.539225][ T9608] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 249.552883][ T9608] CPU: 1 PID: 9608 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #29 [ 249.560923][ T9608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.571093][ T9608] Call Trace: [ 249.574516][ T9608] dump_stack+0x172/0x1f0 [ 249.578977][ T9608] should_fail.cold+0xa/0x15 [ 249.583598][ T9608] ? fault_create_debugfs_attr+0x1e0/0x1e0 03:40:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 249.589432][ T9608] ? __lock_acquire+0x548/0x3fb0 [ 249.594443][ T9608] should_fail_alloc_page+0x50/0x60 [ 249.600136][ T9608] __alloc_pages_nodemask+0x1a1/0x7e0 [ 249.605549][ T9608] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 249.611294][ T9608] ? find_held_lock+0x35/0x130 [ 249.616125][ T9608] ? cred_has_capability+0x199/0x330 [ 249.621441][ T9608] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 249.627756][ T9608] cache_grow_begin+0x9c/0x860 [ 249.632648][ T9608] ? getname_flags+0xd6/0x5b0 03:40:07 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00), 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 249.637386][ T9608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.643653][ T9608] kmem_cache_alloc+0x62d/0x6f0 [ 249.648518][ T9608] ? selinux_capable+0x36/0x40 [ 249.653324][ T9608] getname_flags+0xd6/0x5b0 [ 249.657996][ T9608] user_path_mountpoint_at+0x29/0x50 [ 249.663319][ T9608] ksys_umount+0x167/0xf00 [ 249.667768][ T9608] ? ksys_write+0x166/0x1f0 [ 249.672318][ T9608] ? __detach_mounts+0x320/0x320 [ 249.677286][ T9608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.682781][ T9608] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.688284][ T9608] ? do_syscall_64+0x26/0x610 [ 249.692976][ T9608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.699056][ T9608] ? do_syscall_64+0x26/0x610 [ 249.703852][ T9608] ? lockdep_hardirqs_on+0x418/0x5d0 [ 249.709157][ T9608] __x64_sys_umount+0x54/0x80 [ 249.713964][ T9608] do_syscall_64+0x103/0x610 [ 249.718570][ T9608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.724474][ T9608] RIP: 0033:0x458079 [ 249.728383][ T9608] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.748179][ T9608] RSP: 002b:00007f9e5316cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 249.757401][ T9608] RAX: ffffffffffffffda RBX: 00007f9e5316cc90 RCX: 0000000000458079 [ 249.765386][ T9608] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 00000000200001c0 [ 249.773359][ T9608] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 249.781336][ T9608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e5316d6d4 03:40:07 executing program 1 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 249.789439][ T9608] R13: 00000000004c6deb R14: 00000000004dc5a8 R15: 0000000000000005 03:40:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1fffffffffffff, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) r2 = accept4$inet(r1, 0x0, &(0x7f0000000000), 0x80000) setsockopt$inet_buf(r2, 0x0, 0x39, &(0x7f0000000040)="0502f200eae9aa27612cd9f2863bb3dd27882ffdca1fabc7cf81769944a4bee541922dbae565e68d2c13e0b4b6f997744f04f5c5a241442b927c7c2aa48a484afe83f39dd8fb7584665142acb892bf1e0cb8838eb4eb45fb9b8ce57abefbf5e0eb21dd190f22da3dc11f73955d72a83797d5cc483a47f5027e187e3c7fb26698226d36eed63ea08f07cfa4445df4e8a891fdaf0a2f148adb339406fff94da8c3ca557442b13d75048dbefab8b1ad361df5158228e1bbf328158174f5026692aeaf2108f60cf278c5cca9ac59f24d5fdb54b5", 0xd2) 03:40:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:08 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:08 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:08 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00), 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:08 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:08 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) prctl$PR_SET_FPEXC(0xc, 0x10000) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000000)) 03:40:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:08 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0xa) 03:40:08 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x8200, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0x6, 0x83, "e78ebfa44ba6c8a9a25b0cf2c8a45986a1b7fb51fd726eb66fa709df242c7160cac6ce90deaf1ae16a415e66d24b5d6f3d9afe6fa1a9155f7b35c185af93c50423823d31c4c54ce617c2931767f2e4f3837ba2dbedfd754671ade6189e0f7b6baacd2c68366d4a9acacce31315d1a6205f572e599b49ea6b8076df670c19c00fa38364"}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x5) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c8, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x29, "f6cabde9cad8f6c2800a569b6d95c1cc8cd2bccff69135ca1acde063db28681e136cfe7aecf3bf1a58"}, &(0x7f0000000180)=0x31) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r4, 0x86c, 0x30}, 0xc) 03:40:08 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00), 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:08 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:09 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:09 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) read$alg(r1, &(0x7f00000002c0)=""/138, 0x8a) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0xeb, 0x80}) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:40:09 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:09 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:09 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) connect$ax25(r1, &(0x7f0000000040)={{0x3, @null, 0x1}, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c8, 0x0) 03:40:09 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:09 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 251.914297][ T9728] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:40:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) [ 252.053647][ T9728] FAT-fs (loop2): Filesystem has been set read-only [ 252.140164][ T9713] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 252.169194][ T9713] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:40:10 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:10 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x3, 0x100000000}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@generic={0x3, 0x6, 0x100000000}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x200ffffffffffe, 0x5) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c8, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000000c0)={0x1, 0xaf, "f7ea5990956659c88ed4cc9c004b780c72ab6bc5a8429653fd698b68463b5930cd3418c89e4d39b260107c4f0a2f958bc74360b7b717c4c0769326f840bbf47ac819df62d2f514105594bb3d8596e246fe8133073a58d9c79815885e851428ee265ba8e6e830d93e88293b85f3661b55f3aa8851c83ff9e7c9f3f7380b25f0c1a0cb74eae835ee885086e2196f723dde166bd74c00bd83f4489d8bf74d7e84c27eb80d661878557f23a5d05cc4c674"}) 03:40:10 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10100, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000100)={0x7, 0x1}) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:10 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, 0x0) 03:40:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x5) r1 = fcntl$dupfd(r0, 0x221c9f2758239bd2, r0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x7fff}, &(0x7f0000000040)=0x8) prctl$PR_SVE_GET_VL(0x33, 0x14323) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r2, 0xcc, &(0x7f0000000080)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x81, @mcast2, 0x69}, @in6={0xa, 0x4e24, 0x100, @ipv4={[], [], @multicast2}, 0x7}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x100, @mcast1, 0x1}, @in6={0xa, 0x4e22, 0x400, @rand_addr="6be0cdbdf65beed6880c441b872ff6b8", 0x9}, @in6={0xa, 0x4e21, 0x80000000, @mcast2, 0x3}]}, &(0x7f00000001c0)=0x10) getpeername(r0, &(0x7f0000000200)=@generic, &(0x7f0000000280)=0x80) write$P9_RAUTH(r1, &(0x7f00000002c0)={0x14, 0x67, 0x2, {0x20, 0x1, 0x6}}, 0x14) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:40:10 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f0000000040)='./file0\x00', 0xb) 03:40:10 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, 0x0) [ 252.495176][ T9778] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:40:10 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c8, 0x0) [ 252.637635][ T9778] FAT-fs (loop2): Filesystem has been set read-only 03:40:10 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000), 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, 0x0) 03:40:10 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)='user(GPLlo\x9d+*self\x00', 0xfffffffffffffff8) keyctl$clear(0x7, r1) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 252.775562][ T9763] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 252.789256][ T9763] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 03:40:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x100000000000, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) 03:40:10 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getrlimit(0x0, &(0x7f0000000000)) 03:40:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x800443d2, 0x0) 03:40:10 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:10 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:11 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000100)='user(GPLlo\x9d+*self\x00', 0xfffffffffffffff8) keyctl$clear(0x7, r1) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x42000, 0x0) connect$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x0, 0x1, 0x7, 0xc8e, 0x2, "aef2ed7c83a52fe5afd639b891187d209d18ed13d12214029758456fa22cadc1ad6fd94ec94b9f721d86d26c2be507cc12c8a7edef72af475ee55ea7dc5a60", 0x2}, 0x60) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffde4, 0xe8, 0x10001, {"ee7067b7bdea0bd748b6c814f3c5ebae882956f8da9482165d824009eccc969191d75c98261c00f608610aab4d881c87f9a9bbdb3a184d5ea3cccfef7c5b2425233465d958a946540ff6d2ee58df10276f6a63c918af53d5ecdcf5212afe825282890d86081131840a3595e90a1e39458f2395a5974d78d1d6424040557c56c54c6cc5e9ba2961881b2a71de2ce0d0b17b2ce004743dddb4918241b9cfb6212775eb34e2a8ffbe5a537fbc1cadeed5580f7f73094cc72ae275f87e878a5382c5"}}, {0x0, "9938ff4e38bda6f433a39ae09a5a63ca958650f040db54443876034b6ae5a97765242cf35765238053e8a2a888e4270619996d83dd4b8c9527914e965ffbfaebfc37e6e98b5c950877c4cf007595482b06f4a37caab06d202221e0ea57d984663c7d37a6c0a80255020906aaf79488db4233e107c93a712c71eb0bc106c89ea23e20a539dd0c2aa2e41609d18f9769c00a5496060ede6caa548beed228e6044999e6541a6379"}}, &(0x7f0000000140)=""/52, 0xfffffffffffffedc, 0x34, 0x1}, 0x60) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c8, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x2) 03:40:11 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:11 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x800004) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:11 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7f, 0x5) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3f) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000100), 0x1000000000000060) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1, 0x15012, r2, 0x0) close(r3) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c8, 0x0) fstat(r0, &(0x7f0000000000)) 03:40:11 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:11 executing program 1: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:11 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000700)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)='./file0\x00') mount(&(0x7f00000009c0)=ANY=[@ANYBLOB="2f646576fac9570d007969315a1112fee28c7df92c392b21b3ee4dcbcd13643d276e5fbfb8645d0c923e13732df7fb864d4d2807180fc47f4ba2587263f7500de259e8c8c15ee593a29c7c00db226e83eb63e09b68f5126118058d939b789c053f3879074f62d355428c93aed0e8a21201006e364fa8a091f727953fed1de81e8bf36f4a8ea7efc32a8d1670a72aa01b58b435c8428c6bc29abc66bd9688a29afc0b33a4c503a7fe675fc3f3cf4c474963a81d6be70a8d39cf1162f087ade1a761f291f27b2986bf5d5d955cfbdeb4e0ddc493e0f4ea47b49f6ae3"], &(0x7f0000000880)='./file0\x00', &(0x7f00000004c0)='nfsd\x00', 0x2000023, &(0x7f00000006c0)='\x8auU{-\x154\x05-\xab\xc0\xcb\x1an\xd76*5\xec2c\x9f\xcf\xb8\xb6v\x9aA\x06K\x95\xd4dx#\xf8\x90\r\xf1S\xc4\xc2\a\b\x03^\xe6b\x03\xaal)eb,z4\xc9\xe8\x11Y\xacV') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_xen(&(0x7f0000002a00)='syz', &(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)='9p\x00', 0x8, &(0x7f0000002b80)={'trans=xen,', {[], [{@subj_type={'subj_type', 0x3d, 'selinux-^,GPL'}}, {@fowner_eq={'fowner'}}]}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c8, 0x0) 03:40:11 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000009c0)={0x0, 0x6}, &(0x7f0000000a00)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a40)={r3, 0x400}, 0x8) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000940)="a5303521ba21440166f072cfa5f1bcc1", 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)="f60065cef0d6e3cc6519afc852cb2152386a69d7a425e3f245d014507e4de60ea1cc1026", 0x24}, {&(0x7f0000000200)="69fd0216b51d8a9e742d1e4c6d428bd1a7deef0a20b1bf972a9968b20808ab33f7e5bd681c863421ffb2ad2c7ebbd5ef4d9177f6e5b8bf8dc9a0319d1cdef55d280b4147252f5dd86188bfb67045642ccdb1c52cc92efd60fa8932", 0x5b}, {&(0x7f00000002c0)="31a9b66915ae676e18799ff49ee96ab64bdeb2d715f30edb8687948f8f996482592363dff324ad96a09b8d7c77c257a4ea48901b0dd947a98483b5210ea378f6d8f97df5dfa15626ac8bd551d15af37be27c3d41f8c52206f881df7379dae3449fbd69569edda69d1cf5afe161ead10b28d89c5cf53b69c9c20ede4639b55cf85ce387ba694ec9e813772134fadd9bb86f187230c1c64860f440dd91a212bd092e153bc14473038eef95acc5b8b8e84dfc11578be343bd71628dd096eb767823", 0xc0}, {&(0x7f0000000380)="498f1d3d39f95457178b5f6e1a1c181b0907355b91c179347bf2c3252b5f2403bd180f369c88be8acf1aa0b179df39abccaf292a4e996da431afd014386b4a732efedc788efddc4d86b2462e53a12ca5bb622131d174beea7b5156ec3950f7604c0a396619f843b532d36edb42b9af8526210c71cc54275e89794e524379d2e628ee7afa4c0f191481bf842a6e8d14893c444a13a835fdedadd18a21bece255f28c67f9a0fb46417ca127cc53a3d3df07cbfb2296bd25b0ac48ea59230f226c83428723de15e97efe070a522ab4da9ba77b082c72cca", 0xd6}, {&(0x7f0000000480)="86b99a629052ed80723916e0f9bb070423064faec280f6ba0720bca465f6435a27b34b469a37f026dfd9450ff821c57c037a65aec27e8c434cd202470b1d4a587d595044fde87d35b8cf8727b213b19fe4ca674a0f526ad3d1688e8383975f57df40bb3ad44837aee26546b4ec0e9bc37e1d12a009122962391f8d38252876b639bb4fda86991162237fa766f3747097a7cf12c2289d88d843eff225a6c2e3e6d0f04dd19fe1bbc66e463bcfa5", 0xad}, {&(0x7f0000000140)="40ea94b7704683ac55b8a8f7ac09a2474ddc445c18447e9feaacb92c22", 0x1d}, {&(0x7f0000000540)="973c406d9c80fd751bd55b209749f3a76377fe1f5da01de4a06d48ca0660d78287e5497c798241d60d701bc26413b8fe83e89bfaa4ca9e991906a973b8a05d460779357cdfce93e54595400f61d82e80de064aef6b2cd69598adbed89914d8a544f9be741e3793e66148a3071dd667ff325f72c2914a38f69216bb16be2c5245351812bf5d6f183ffb01307c", 0x8c}], 0x7, &(0x7f0000000680)=[{0xc0, 0x10e, 0x9, "46d5f77d192f5d170fc88eb84b2cd41bf2a0d6a941bda5863af741d6c8e05cb9807658878c7d3f0115a8d56bf2a1a219977f1069e027ef625accfb72e72c5ba0e7798c7ae33191fe8781692c0a4bad6af09895d53d49e760ed55230002e3758288cd46a6d3f990558e7c2fe588bd00e0c01c7e2dea0c4f42e284759064fdcd07ae81ee54644d7bc7163fbab7cee2c63ef0123a9cf165ea51d0da29c34f5fab305107bc2adb79957882ad57290e2e07"}, {0x40, 0x0, 0x0, "d0293704a23ef65a65dfa5f57479a241fda340872d5ca89648c1189133a4d8674ad729b19ae76bbc589f2a019e0db6"}, {0x10, 0xff, 0x7}, {0x110, 0x0, 0x8, "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"}], 0x220}, 0x20000000) 03:40:11 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c8, 0x0) [ 254.002665][ T9866] 9pnet: Could not find request transport: xen 03:40:12 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000040)={[{0x5, 0x0, 0xffffffff, 0x1, 0x0, 0x1, 0x5, 0x2, 0x401, 0x5, 0x1, 0x9, 0x5eb}, {0x3, 0x8000, 0x7fff, 0x3, 0x80000001, 0xd4e5, 0x3, 0x7, 0xce, 0x0, 0x6, 0x8, 0x800}, {0xeba, 0x600000000000, 0x5, 0x4, 0xf8, 0x0, 0x5, 0x5, 0x6, 0x1, 0x0, 0x5, 0x5da}], 0x6}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x2, 0x30}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0xfffffffffffffff8, 0xa, 0x9, 0x0, r1}, &(0x7f0000000240)=0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:12 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:12 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:12 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x41, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000080)={0x4, 0x0, 0x0, 0xffff, 0x1, {0x8, 0x3}}) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 03:40:12 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = msgget(0x2, 0xc0) msgctl$IPC_RMID(r0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x20) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000080)={0xe0c, 0x0, 0x8, 0x9, 0xcc, 0x401, 0x1000}) [ 254.513958][ T9902] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 254.600575][ T9902] FAT-fs (loop3): Filesystem has been set read-only 03:40:12 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4d, 0x400) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f00000002c0)) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000480)=0xe8) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, r2}}, {@cache_fscache='cache=fscache'}], [{@subj_type={'subj_type', 0x3d, '/proc/sys/net/ipv4/vs/sync_ports\x00'}}, {@uid_gt={'uid>', r3}}, {@fowner_lt={'fowner<', r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) 03:40:12 executing program 2: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) [ 254.733873][ T9897] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 254.755850][ T9897] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 03:40:12 executing program 3: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x3e4, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000308002745e5767d472fdb53082d5faa"], 0x13) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$9p(0xffffffffffffffff, &(0x7f0000000240)="2c3bcc0de5e1c65be56fc68b3c3c9e4533b0a9e729429c769b5491945ed010e3fff6942a00c516370b73c72203836d7f11257d2340e1c0ea38519823ee09cb27084ffacde4e45989239972b8c46e74dbc20d9d22879c9c2e55137668e5e7ee4ce6e49433d5a7498c54c117681aa83c34a17564833599411e58612d86e0f0", 0x7e) 03:40:12 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x10001, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@version_L='version=9p2000.L'}], [{@dont_appraise='dont_appraise'}, {@appraise='appraise'}, {@subj_role={'subj_role', 0x3d, '}bdevem0em1GPL'}}, {@uid_lt={'uid<', r2}}, {@dont_hash='dont_hash'}]}}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x210000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x6) 03:40:12 executing program 4: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) 03:40:12 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) recvfrom$inet(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) [ 408.407525][ T1042] INFO: task syz-executor.5:8226 blocked for more than 143 seconds. [ 408.416576][ T1042] Not tainted 5.1.0-rc1+ #29 [ 408.426673][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 408.436152][ T1042] syz-executor.5 D24344 8226 1 0x00000004 [ 408.443316][ T1042] Call Trace: [ 408.446749][ T1042] __schedule+0x817/0x1cc0 [ 408.451498][ T1042] ? __mutex_lock+0x721/0x1310 [ 408.456489][ T1042] ? __sched_text_start+0x8/0x8 [ 408.461535][ T1042] schedule+0x92/0x180 [ 408.466139][ T1042] schedule_preempt_disabled+0x13/0x20 [ 408.472369][ T1042] __mutex_lock+0x726/0x1310 [ 408.476963][ T1042] ? fuse_lock_inode+0xba/0xf0 [ 408.481936][ T1042] ? mutex_trylock+0x1e0/0x1e0 [ 408.486697][ T1042] ? d_alloc_parallel+0x7b0/0x1bc0 [ 408.492190][ T1042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.500007][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.507367][ T1042] ? kasan_check_read+0x11/0x20 [ 408.512796][ T1042] mutex_lock_nested+0x16/0x20 [ 408.518190][ T1042] ? mutex_lock_nested+0x16/0x20 [ 408.523472][ T1042] fuse_lock_inode+0xba/0xf0 [ 408.529025][ T1042] fuse_lookup+0x8e/0x350 [ 408.534500][ T1042] ? fuse_lookup_name+0x670/0x670 [ 408.541068][ T1042] ? __d_lookup_rcu+0x6c0/0x6c0 [ 408.545993][ T1042] ? find_held_lock+0x35/0x130 [ 408.550966][ T1042] ? __d_lookup+0x40c/0x760 [ 408.555565][ T1042] ? lockdep_init_map+0x1be/0x6d0 [ 408.560784][ T1042] ? lockdep_init_map+0x1be/0x6d0 [ 408.565824][ T1042] __lookup_slow+0x27e/0x500 [ 408.571083][ T1042] ? vfs_unlink+0x560/0x560 [ 408.575731][ T1042] ? __d_lookup+0x433/0x760 [ 408.580500][ T1042] lookup_slow+0x58/0x80 [ 408.585440][ T1042] walk_component+0x74b/0x2000 [ 408.590351][ T1042] ? selinux_capable+0x40/0x40 [ 408.595430][ T1042] ? path_init+0x18f0/0x18f0 [ 408.600136][ T1042] ? fuse_allow_current_process+0x113/0x350 [ 408.607056][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.614657][ T1042] ? security_inode_permission+0xd5/0x110 [ 408.621961][ T1042] ? inode_permission+0xb4/0x570 [ 408.628179][ T1042] link_path_walk.part.0+0x980/0x1340 [ 408.633800][ T1042] ? walk_component+0x2000/0x2000 [ 408.640668][ T1042] ? nd_jump_root+0x1ec/0x3e0 [ 408.645487][ T1042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 408.652168][ T1042] ? trailing_symlink+0x2b5/0x970 [ 408.658189][ T1042] path_mountpoint+0xe0/0x1e60 [ 408.662964][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.669770][ T1042] ? path_openat+0x46e0/0x46e0 [ 408.674635][ T1042] ? cache_grow_end+0xa4/0x190 [ 408.679500][ T1042] filename_mountpoint+0x190/0x3c0 [ 408.684747][ T1042] ? filename_parentat.isra.0+0x410/0x410 [ 408.690644][ T1042] ? __phys_addr_symbol+0x30/0x70 [ 408.696192][ T1042] ? __check_object_size+0x3d/0x42f [ 408.702773][ T1042] ? strncpy_from_user+0x2a8/0x380 [ 408.708961][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.715301][ T1042] ? getname_flags+0x277/0x5b0 [ 408.720256][ T1042] user_path_mountpoint_at+0x3a/0x50 [ 408.725565][ T1042] ksys_umount+0x167/0xf00 [ 408.730177][ T1042] ? __sched_text_start+0x8/0x8 [ 408.735058][ T1042] ? __detach_mounts+0x320/0x320 [ 408.740835][ T1042] ? prepare_exit_to_usermode+0x279/0x2e0 [ 408.747853][ T1042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.754612][ T1042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.760168][ T1042] ? do_syscall_64+0x26/0x610 [ 408.765096][ T1042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.771380][ T1042] ? do_syscall_64+0x26/0x610 [ 408.776170][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 408.781555][ T1042] __x64_sys_umount+0x54/0x80 [ 408.791442][ T1042] do_syscall_64+0x103/0x610 [ 408.796139][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.802921][ T1042] RIP: 0033:0x45aac7 [ 408.807617][ T1042] Code: 24 00 00 02 00 48 81 c4 08 00 02 00 c3 e8 a1 f4 ff ff e9 4c ff ff ff 48 8d bc 24 10 00 02 00 48 39 3b 75 8c 48 89 23 eb 87 cc cc cc cc cc cc cc cc cc 64 48 8b 0c 25 f8 ff ff ff 48 8b 71 10 [ 408.828168][ T1042] RSP: 002b:00007fff47e415a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 408.837335][ T1042] RAX: ffffffffffffffda RBX: 000000000003e01a RCX: 000000000045aac7 [ 408.845995][ T1042] RDX: 0000000000402e80 RSI: 0000000000000002 RDI: 00007fff47e41650 [ 408.854531][ T1042] RBP: 00000000000000ec R08: 0000000000000000 R09: 000000000000000b [ 408.862584][ T1042] R10: 0000000000000006 R11: 0000000000000202 R12: 00007fff47e426e0 [ 408.871088][ T1042] R13: 0000000001e42940 R14: 0000000000000000 R15: 00007fff47e426e0 [ 408.879260][ T1042] [ 408.879260][ T1042] Showing all locks held in the system: [ 408.887433][ T1042] 1 lock held by khungtaskd/1042: [ 408.893088][ T1042] #0: 00000000a17b7f19 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 408.904438][ T1042] 1 lock held by rsyslogd/8052: [ 408.909606][ T1042] #0: 000000009c27176a (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 408.918861][ T1042] 2 locks held by getty/8174: [ 408.924132][ T1042] #0: 000000003cd888e6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 408.933876][ T1042] #1: 000000007449ec8e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 408.943813][ T1042] 2 locks held by getty/8175: [ 408.949908][ T1042] #0: 00000000522126c5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 408.959207][ T1042] #1: 0000000029ecf12c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 408.969076][ T1042] 2 locks held by getty/8176: [ 408.973746][ T1042] #0: 00000000e4e40c5d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 408.982783][ T1042] #1: 000000007640c925 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 408.992463][ T1042] 2 locks held by getty/8177: [ 408.997810][ T1042] #0: 00000000e7e9e09a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 409.008366][ T1042] #1: 00000000e5cc541b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 409.019462][ T1042] 2 locks held by getty/8178: [ 409.024274][ T1042] #0: 00000000f136086a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 409.034072][ T1042] #1: 000000009ff9c276 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 409.044001][ T1042] 2 locks held by getty/8179: [ 409.049005][ T1042] #0: 000000003689db90 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 409.058470][ T1042] #1: 0000000077c7e821 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 409.069227][ T1042] 2 locks held by getty/8180: [ 409.073916][ T1042] #0: 00000000aa9a9159 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 409.084358][ T1042] #1: 000000005d653df1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 409.094485][ T1042] 2 locks held by syz-executor.5/8226: [ 409.101985][ T1042] #0: 000000005067bc44 (&type->i_mutex_dir_key#8){++++}, at: lookup_slow+0x4a/0x80 [ 409.113983][ T1042] #1: 00000000a0480625 (&fi->mutex){+.+.}, at: fuse_lock_inode+0xba/0xf0 [ 409.123152][ T1042] 2 locks held by syz-executor.5/9876: [ 409.129033][ T1042] #0: 000000005067bc44 (&type->i_mutex_dir_key#8){++++}, at: lookup_slow+0x4a/0x80 [ 409.138700][ T1042] #1: 00000000a0480625 (&fi->mutex){+.+.}, at: fuse_lock_inode+0xba/0xf0 [ 409.147793][ T1042] [ 409.150114][ T1042] ============================================= [ 409.150114][ T1042] [ 409.158941][ T1042] NMI backtrace for cpu 1 [ 409.164197][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc1+ #29 [ 409.171862][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.182165][ T1042] Call Trace: [ 409.185459][ T1042] dump_stack+0x172/0x1f0 [ 409.189884][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 409.195085][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 409.201198][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 409.207724][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 409.215594][ T1042] watchdog+0x9b7/0xec0 [ 409.220523][ T1042] kthread+0x357/0x430 [ 409.224589][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 409.230914][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 409.237414][ T1042] ret_from_fork+0x3a/0x50 [ 409.242052][ T1042] Sending NMI from CPU 1 to CPUs 0: [ 409.247650][ C0] NMI backtrace for cpu 0 [ 409.247655][ C0] CPU: 0 PID: 8222 Comm: kworker/0:3 Not tainted 5.1.0-rc1+ #29 [ 409.247659][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.247662][ C0] Workqueue: events_power_efficient gc_worker [ 409.247667][ C0] RIP: 0010:lockdep_hardirqs_off+0x1d0/0x2d0 [ 409.247675][ C0] Code: 00 00 00 44 89 a3 44 08 00 00 5b 41 5c 41 5d 5d c3 48 c7 c0 a8 96 92 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 <0f> 85 d3 00 00 00 48 83 3d fa e6 3a 07 00 0f 84 b9 00 00 00 9c 58 [ 409.247677][ C0] RSP: 0018:ffff888097367be8 EFLAGS: 00000046 [ 409.247682][ C0] RAX: 1ffffffff11252d5 RBX: ffff88809735c4c0 RCX: 0000000000000000 [ 409.247685][ C0] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffff88809735cd3c [ 409.247689][ C0] RBP: ffff888097367c00 R08: ffff88809735c4c0 R09: ffffed1015d05bc8 [ 409.247692][ C0] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffffffff85ab795f [ 409.247695][ C0] R13: ffff88809735c4c0 R14: ffffffff85ab795f R15: fffffbfff11252d5 [ 409.247716][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 409.247720][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.247723][ C0] CR2: ffffffffff600400 CR3: 00000000955f2000 CR4: 00000000001406f0 [ 409.247725][ C0] Call Trace: [ 409.247727][ C0] ? process_one_work+0x98e/0x1790 [ 409.247729][ C0] trace_hardirqs_off+0x62/0x220 [ 409.247732][ C0] ? rcu_dynticks_curr_cpu_in_eqs+0x54/0xb0 [ 409.247734][ C0] gc_worker+0x23f/0xea0 [ 409.247736][ C0] ? init_conntrack.isra.0+0x1170/0x1170 [ 409.247738][ C0] process_one_work+0x98e/0x1790 [ 409.247741][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 409.247743][ C0] ? lock_acquire+0x16f/0x3f0 [ 409.247745][ C0] worker_thread+0x98/0xe40 [ 409.247747][ C0] ? trace_hardirqs_on+0x67/0x230 [ 409.247749][ C0] kthread+0x357/0x430 [ 409.247752][ C0] ? process_one_work+0x1790/0x1790 [ 409.247754][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 409.247760][ C0] ret_from_fork+0x3a/0x50 [ 409.248433][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 409.456147][ T1042] CPU: 1 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc1+ #29 [ 409.463722][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.473977][ T1042] Call Trace: [ 409.477275][ T1042] dump_stack+0x172/0x1f0 [ 409.481609][ T1042] panic+0x2cb/0x65c [ 409.485499][ T1042] ? __warn_printk+0xf3/0xf3 [ 409.490134][ T1042] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 409.495893][ T1042] ? printk_safe_flush+0xf2/0x140 [ 409.501143][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.507481][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 409.513392][ T1042] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 409.519547][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 409.525706][ T1042] watchdog+0x9c8/0xec0 [ 409.529867][ T1042] kthread+0x357/0x430 [ 409.533974][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 409.539526][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 409.545762][ T1042] ret_from_fork+0x3a/0x50 [ 409.551127][ T1042] Kernel Offset: disabled [ 409.555462][ T1042] Rebooting in 86400 seconds..