c3704e9f3f984b6b7b1039cfd93e445671550a8131d19b3f6f8cbc"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000001100)=ANY=[@ANYPTR64], 0x0, 0x0, 0x8000e, 0x0) syz_mount_image$nfs4(&(0x7f0000000100)='nfs4\x00', &(0x7f0000000340)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000380)=[{&(0x7f0000000f00)="941fad39d9fe733b46807444c2bcd06408ee58dbf2650bef6435d06bf0fe2e9665194b7f64d1f3dd2f0c4ce72dc5ed87dff1829074e7d98019ef6dac4a156b1ce1d91fec7880396b778080015fa70cc6d5afa3ea9600200bcc36368737b4c7fcdb97e6008ce8dd575a8161e76d12427012d191d8a3ac1eaaf4112aa21835b7a998bdf4267040373a3ad7e6529466ed9e27aa8ca3fabec6ccef9f4fed40e41a298f5b6e16b25bdfa9dca3099b2d28", 0xae, 0x6}], 0x2000, 0x0) [ 1614.463663][T30077] input: syz1 as /devices/virtual/input/input44 16:00:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252e"], 0xdf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 1614.803884][T30080] input: syz1 as /devices/virtual/input/input45 16:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:07 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1614.946201][T30074] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1615.014096][T30074] FAT-fs (loop2): Filesystem has been set read-only 16:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) syz_execute_func(&(0x7f0000000200)="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") [ 1615.059947][T30074] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1615.114941][T30074] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1615.213239][T30108] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1615.247296][T30103] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1615.256602][T30103] FAT-fs (loop0): Filesystem has been set read-only 16:00:07 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 1615.265598][T30103] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1615.277198][T30103] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1615.287426][T30103] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1615.319112][T30102] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:07 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000680)='./bus\x00', 0x0) unlink(&(0x7f0000000180)='./bus\x00') 16:00:07 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252e"], 0xdf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:07 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth1_to_bridge\x00'}, 0x18) 16:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 1616.131939][T30158] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_to_bridge, syncid = 0, id = 0 16:00:08 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xfe7ff7fbbfff3fca, 0x0) 16:00:08 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300), 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:08 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="480000001400190a20ffff7fffffff562c113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 16:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 16:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 1616.845045][T30169] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1616.893199][T30169] FAT-fs (loop2): Filesystem has been set read-only 16:00:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x3) r2 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='stack\x00', 0xfffffffffffffff9) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="8f646fdc1eb1d2c91f5da1ad9cd0a72c47ad30133e8446320540519ab50edff5a356b5ced4832c0624e0ab46d476d2aa32522aed7c1bb3955c9e246eb63cc9", 0x3f, r2) write$binfmt_script(r1, 0x0, 0x0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fchmodat(r1, &(0x7f0000000240)='./file0\x00', 0x100) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stack\x00') creat(&(0x7f0000000000)='./file0\x00', 0x100) preadv(r3, &(0x7f00000017c0), 0x199, 0x0) 16:00:09 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) r0 = request_key(&(0x7f0000000140)='big_key\x00', 0x0, &(0x7f0000000200)='stack\x00', 0xfffffffffffffff9) add_key(&(0x7f0000000080)='cifs.spnego\x00', 0x0, &(0x7f0000000100)="8f646fdc1eb1d2c91f5da1ad9cd0a72c47ad30133e8446320540519ab50edff5a356b5ced4832c0624e0ab46d476d2aa32522aed7c1bb3955c9e246eb63cc9", 0x3f, r0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stack\x00') creat(&(0x7f0000000000)='./file0\x00', 0x100) preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 1616.971433][T30169] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1617.053228][T30169] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1617.268750][T30196] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1617.314158][T30196] FAT-fs (loop5): Filesystem has been set read-only [ 1617.324011][T30196] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:09 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1617.383550][T30196] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300), 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:09 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 1617.687419][T30223] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1617.700450][T30217] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1617.710747][T30223] FAT-fs (loop0): Filesystem has been set read-only [ 1617.738091][T30217] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 0) [ 1617.794490][T30215] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:10 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1618.086298][T30229] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1618.120163][T30229] FAT-fs (loop5): Filesystem has been set read-only [ 1618.143865][T30229] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1618.159453][T30229] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:10 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x7e, 0x88) r2 = dup2(r1, r1) read$FUSE(r2, &(0x7f0000001240), 0xffffff7b) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) [ 1618.195727][T30248] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1618.204988][T30248] FAT-fs (loop0): Filesystem has been set read-only [ 1618.213410][T30242] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1618.231429][T30242] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 0) 16:00:10 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9"], 0xca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:10 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1618.265253][T30241] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300), 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x100], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x6, 0x2, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) keyctl$join(0x1, &(0x7f0000000d00)={'syz'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000002c0)={'teql0\x00'}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000001100)=ANY=[], 0x0, 0x0, 0x0, 0x0) [ 1618.699940][T30273] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1618.730407][T30267] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1618.739614][T30273] FAT-fs (loop0): Filesystem has been set read-only [ 1618.751959][T30267] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 0) [ 1618.768579][T30262] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:11 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1618.912887][T30259] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000011c0)="b6", 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) dup3(r0, r1, 0x0) [ 1618.971242][T30259] FAT-fs (loop2): Filesystem has been set read-only [ 1619.011690][T30259] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1619.022733][T30259] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9"], 0xca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476"], 0xe5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:11 executing program 1: personality(0x20006401006) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 16:00:11 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r0, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:11 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r0, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) [ 1619.696577][T30294] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1619.750745][T30294] FAT-fs (loop2): Filesystem has been set read-only [ 1619.765969][T30294] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:11 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r0, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) [ 1619.808043][T30294] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:11 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9"], 0xca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:12 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:12 executing program 1: personality(0x20006401006) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1620.302632][T30347] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1620.412149][T30341] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1620.433007][T30334] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1620.442961][T30347] FAT-fs (loop0): Filesystem has been set read-only [ 1620.449576][T30334] FAT-fs (loop2): Filesystem has been set read-only 16:00:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476"], 0xe5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:12 executing program 1: personality(0x20006401006) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 1620.450448][T30334] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1620.463673][T30341] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:12 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c2"], 0xd8) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) [ 1620.531215][T30341] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1620.586125][T30341] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1620.599064][T30337] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:12 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, 0x0) msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, 0x0) msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) 16:00:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476"], 0xe5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, 0x0) msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c2"], 0xd8) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:13 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:14 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:14 executing program 1: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000000)) setgid(0x0) 16:00:14 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:14 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c05") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:14 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c2"], 0xd8) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001f4, 0x0) 16:00:14 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c05") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:15 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:15 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @local}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) write(r0, &(0x7f0000000140)="150000000800000000000000c86b6525000010", 0x13) 16:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c05") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) [ 1622.931607][T30455] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1622.956344][T30455] FAT-fs (loop2): Filesystem has been set read-only [ 1622.964307][T30455] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1622.975132][T30455] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319b") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:15 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:15 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252e"], 0xdf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x1, 0x0, [0x10000040000021]}) 16:00:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319b") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319b") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x3) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 16:00:16 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd0") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd0") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:16 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd0") msgrcv(r1, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e"], 0xc7) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:16 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252e"], 0xdf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, &(0x7f0000000380)={0x0, ""/4096}, 0x1008, 0x3, 0x0) 16:00:17 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) 16:00:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:17 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) 16:00:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:17 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252e"], 0xdf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x5000aea5, &(0x7f0000000100)) 16:00:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) 16:00:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:18 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 16:00:18 executing program 1: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568"], 0x6c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 16:00:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:18 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 16:00:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000000c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x80ffff, 0x0, [{0x0, 0x0, 0x0, [], 0x80ffff}]}}) [ 1627.029465][T30646] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:19 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1627.077979][T30646] FAT-fs (loop5): Filesystem has been set read-only [ 1627.136805][T30646] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:19 executing program 1: 16:00:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:19 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:19 executing program 3: 16:00:19 executing program 1: 16:00:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) [ 1627.375955][T30669] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1627.461163][T30669] FAT-fs (loop0): Filesystem has been set read-only 16:00:19 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) [ 1627.553419][T30665] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:19 executing program 3: 16:00:19 executing program 1: [ 1627.603388][T30665] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1627.622733][T30665] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1627.682121][T30665] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:19 executing program 3: [ 1627.767759][T30664] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:20 executing program 1: 16:00:20 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1628.002815][T30694] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1628.057988][T30694] FAT-fs (loop2): Filesystem has been set read-only [ 1628.077148][T30694] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1628.092021][T30694] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:20 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:20 executing program 3: 16:00:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:20 executing program 1: 16:00:20 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee0"], 0xe0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x0, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:20 executing program 3: 16:00:20 executing program 1: 16:00:20 executing program 3: 16:00:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:20 executing program 1: 16:00:21 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1629.191748][T30747] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1629.206212][T30747] FAT-fs (loop0): Filesystem has been set read-only [ 1629.233432][T30744] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1629.249447][T30744] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:21 executing program 3: 16:00:21 executing program 1: 16:00:21 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee0"], 0xe0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:21 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1629.280181][T30744] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1629.291806][T30744] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1629.305430][T30743] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:21 executing program 3: 16:00:21 executing program 1: 16:00:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x10004e21}, 0x10) 16:00:21 executing program 1: 16:00:21 executing program 3: 16:00:21 executing program 1: 16:00:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, 0x0, 0x0) 16:00:21 executing program 3: [ 1629.858112][T30774] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, 0x0, 0x0) [ 1629.909444][T30774] FAT-fs (loop5): Filesystem has been set read-only [ 1629.930816][T30774] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1629.948383][T30774] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:22 executing program 1: 16:00:22 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:22 executing program 1: 16:00:22 executing program 3: 16:00:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, 0x0, 0x0) 16:00:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:22 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee0"], 0xe0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:22 executing program 3: 16:00:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100), 0x10) 16:00:22 executing program 1: [ 1630.502002][T30800] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:22 executing program 3: [ 1630.560715][T30800] FAT-fs (loop5): Filesystem has been set read-only 16:00:22 executing program 1: 16:00:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100), 0x10) [ 1630.641741][T30800] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1630.804804][T30800] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:23 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:23 executing program 3: 16:00:23 executing program 1: 16:00:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x2000000000000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000100), 0x10) 16:00:23 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:23 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649"], 0xe2) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:23 executing program 3: 16:00:23 executing program 1: 16:00:23 executing program 3: 16:00:23 executing program 4: 16:00:23 executing program 4: 16:00:23 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:23 executing program 3: 16:00:23 executing program 1: 16:00:24 executing program 4: 16:00:24 executing program 3: 16:00:24 executing program 4: 16:00:24 executing program 1: 16:00:24 executing program 3: 16:00:24 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:24 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649"], 0xe2) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:24 executing program 4: pause() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x800000000040, 0x8001, 0x0, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000440)="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") 16:00:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="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") [ 1632.388594][T30869] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1632.456000][T30869] FAT-fs (loop0): Filesystem has been set read-only [ 1632.531653][T30869] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1632.576941][T30869] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:00:24 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 16:00:24 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1632.699572][T30892] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1632.719559][T30892] FAT-fs (loop2): Filesystem has been set read-only [ 1632.730765][T30892] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:24 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000005c0)=ANY=[@ANYBLOB="000400000000000002004e2100000e6d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000"], 0x1) fallocate(r2, 0x3, 0xffffbffffffffa6d, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x2, 0x0, @local}, 0xfffffe91) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, 0x0) umount2(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r3 = syz_open_dev$usbmon(0x0, 0x40, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000500)={0x6c, 0x0, {0x3, 0x2, 0x0, 0x3}}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000380)={@local}) stat(0x0, 0x0) flock(0xffffffffffffffff, 0x4) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) getsockopt$inet6_int(r1, 0x29, 0xf, &(0x7f0000000000), &(0x7f00000003c0)=0x4) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1632.757606][T30892] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:24 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649"], 0xe2) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1632.879002][T30908] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1632.901566][T30908] FAT-fs (loop0): Filesystem has been set read-only [ 1632.912092][T30906] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:25 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="cf", 0x1) 16:00:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252e"], 0xdf) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:25 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:25 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:25 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476"], 0xe5) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:25 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:26 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1633.956896][T30946] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1633.995980][T30946] FAT-fs (loop4): Filesystem has been set read-only [ 1634.043464][T30946] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1634.157002][T30946] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1634.187798][T30976] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:26 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1634.265543][T30976] FAT-fs (loop0): Filesystem has been set read-only 16:00:26 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1634.318183][T30974] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:26 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:26 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:26 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94"], 0x73) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1635.424215][T31019] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1635.442609][T31019] FAT-fs (loop2): Filesystem has been set read-only [ 1635.449837][T31019] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:27 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:27 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1636.143831][T31050] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1636.170170][T31050] FAT-fs (loop4): Filesystem has been set read-only [ 1636.195262][T31050] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:00:28 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:28 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:28 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:28 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94"], 0x73) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:28 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:28 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1637.411592][T31105] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1637.460890][T31105] FAT-fs (loop2): Filesystem has been set read-only [ 1637.467865][T31105] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9"], 0xca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 16:00:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:29 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1637.972708][T31133] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1638.081466][T31133] FAT-fs (loop2): Filesystem has been set read-only [ 1638.164769][T31133] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1638.203073][T31133] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:30 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) [ 1638.222581][T31138] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1638.237669][T31138] FAT-fs (loop5): Filesystem has been set read-only [ 1638.248077][T31138] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1638.263890][T31138] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:30 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 16:00:30 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:31 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94"], 0x73) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1639.080136][T31171] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1639.099677][T31171] FAT-fs (loop4): Filesystem has been set read-only [ 1639.123119][T31171] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1639.157752][T31171] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:00:31 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) 16:00:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 16:00:31 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:31 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1639.864884][T31194] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1639.919631][T31194] FAT-fs (loop4): Filesystem has been set read-only [ 1639.950188][T31201] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1639.971846][T31194] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1639.989229][T31201] FAT-fs (loop5): Filesystem has been set read-only [ 1640.007044][T31194] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1640.026456][T31201] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1640.066427][T31201] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:32 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94"], 0x73) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:32 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) 16:00:32 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1640.653716][T31219] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1640.682946][T31219] FAT-fs (loop4): Filesystem has been set read-only [ 1640.712107][T31219] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1640.773082][T31219] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1640.794896][T31236] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1640.811327][T31236] FAT-fs (loop2): Filesystem has been set read-only [ 1640.829971][T31236] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1640.839952][T31236] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:33 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:33 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:33 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:33 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:33 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94"], 0x73) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1641.764900][T31269] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1641.794784][T31269] FAT-fs (loop0): Filesystem has been set read-only [ 1641.925899][T31264] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1641.956807][T31264] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:34 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:34 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1641.996739][T31264] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1642.016930][T31264] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:00:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1642.251837][T31263] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:34 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:34 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:34 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d86"], 0x91) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1643.109914][T31300] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1643.123271][T31300] FAT-fs (loop5): Filesystem has been set read-only [ 1643.143242][T31300] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1643.166927][T31300] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:35 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1643.460157][T31316] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1643.485866][T31316] FAT-fs (loop4): Filesystem has been set read-only [ 1643.529451][T31316] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1643.557348][T31316] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:00:35 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:35 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d86"], 0x91) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1643.852936][T31329] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1643.900761][T31329] FAT-fs (loop5): Filesystem has been set read-only [ 1643.963775][T31329] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:36 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d86"], 0x91) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1644.024280][T31329] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:36 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x4788, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0}, 0xe000000}], 0x1, 0x0) 16:00:36 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1644.670450][T31360] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1644.691918][T31360] FAT-fs (loop5): Filesystem has been set read-only 16:00:36 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d86"], 0x91) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1644.740816][T31360] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1644.758301][T31360] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:36 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:37 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:37 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d86"], 0x91) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1645.482456][T31390] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1645.526781][T31390] FAT-fs (loop5): Filesystem has been set read-only [ 1645.566054][T31390] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:37 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:37 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 0: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d86"], 0x91) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:39 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:39 executing program 3: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b8"], 0xad) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1647.374962][T31455] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1647.421325][T31455] FAT-fs (loop4): Filesystem has been set read-only [ 1647.442404][T31455] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1647.468160][T31455] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:00:39 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:39 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:39 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:40 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:41 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:41 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:41 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:42 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:42 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:42 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1650.382339][T31540] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1650.403513][T31540] FAT-fs (loop5): Filesystem has been set read-only [ 1650.419530][T31540] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1651.401916][T31573] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1651.427668][T31573] FAT-fs (loop4): Filesystem has been set read-only [ 1651.481368][T31573] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:00:43 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:43 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1651.951766][T31587] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1652.010833][T31587] FAT-fs (loop2): Filesystem has been set read-only [ 1652.021682][T31587] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1652.056474][T31587] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:44 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1652.829887][T31619] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1652.873787][T31619] FAT-fs (loop0): Filesystem has been set read-only [ 1652.936400][T31619] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1653.016482][T31619] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:00:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:45 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:45 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:45 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:45 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:45 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1653.798040][T31654] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1653.816709][T31654] FAT-fs (loop0): Filesystem has been set read-only [ 1653.826083][T31662] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1653.831532][T31654] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1653.839465][T31662] FAT-fs (loop4): Filesystem has been set read-only [ 1653.853478][T31654] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:00:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 16:00:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1654.309782][T31667] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1654.364326][T31667] FAT-fs (loop5): Filesystem has been set read-only [ 1654.386917][T31667] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1654.412037][T31667] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:46 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:46 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:47 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 16:00:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:47 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:48 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:48 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 16:00:48 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1656.809133][T31744] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1656.825678][T31744] FAT-fs (loop2): Filesystem has been set read-only [ 1656.879642][T31744] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1656.933825][T31744] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:49 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:49 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:49 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:49 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:51 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e1") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:53 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:53 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:53 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:53 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r3 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r5, 0x4) r6 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000280)={0x10001, 0x1, [0x8b, 0x3, 0xffff, 0xfff, 0x68], 0x8}) getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) 16:00:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x4788, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5ac}}], 0x1, 0x0) [ 1661.945250][T31938] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r3 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r5, 0x4) r6 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000280)={0x10001, 0x1, [0x8b, 0x3, 0xffff, 0xfff, 0x68], 0x8}) getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) [ 1662.004804][T31938] FAT-fs (loop0): Filesystem has been set read-only [ 1662.026901][T31938] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1662.036708][T31938] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:00:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:54 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r3 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r5, 0x4) r6 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$TCSETXW(r6, 0x5435, &(0x7f0000000280)={0x10001, 0x1, [0x8b, 0x3, 0xffff, 0xfff, 0x68], 0x8}) getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000180)=0x6e) 16:00:54 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:54 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1662.450548][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1662.456430][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1662.482823][T31962] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:00:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r4, 0x4) r5 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$TCSETXW(r5, 0x5435, &(0x7f0000000280)={0x10001, 0x1, [0x8b, 0x3, 0xffff, 0xfff, 0x68], 0x8}) 16:00:54 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1662.507460][T31962] FAT-fs (loop0): Filesystem has been set read-only 16:00:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r4, 0x4) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) [ 1662.588550][T31962] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1662.604435][T31962] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:00:54 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:55 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) 16:00:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r4, 0x4) 16:00:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x3f}, &(0x7f0000000400)=0x8) 16:00:55 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:55 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r2 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x23, 0xa9]) 16:00:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:55 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000380)={0x81, 0x1000, 0x9, 0x3f56, 0x1b, 0x3, 0x7ff, 0x80, 0x1, 0x62}) [ 1663.801019][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1663.807579][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:00:55 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x8000, 0x0) 16:00:56 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) [ 1664.110319][T32039] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1664.120909][T32039] FAT-fs (loop2): Filesystem has been set read-only [ 1664.130078][T32039] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1664.142023][T32039] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:56 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='ipddp0\x00') 16:00:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) socket$key(0xf, 0x3, 0x2) 16:00:56 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:56 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) accept$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e) [ 1664.676274][T32060] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1664.710226][T32060] FAT-fs (loop2): Filesystem has been set read-only [ 1664.724949][T32060] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1664.745334][T32060] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) r1 = geteuid() ioprio_get$uid(0x3, r1) 16:00:57 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) geteuid() 16:00:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) [ 1665.383307][T32088] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1665.406942][T32088] FAT-fs (loop0): Filesystem has been set read-only [ 1665.415529][T32088] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 16:00:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) [ 1665.426465][T32088] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:00:57 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:57 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:57 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) [ 1665.734324][T32103] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1665.797654][T32103] FAT-fs (loop5): Filesystem has been set read-only [ 1665.820429][T32103] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1665.895135][T32103] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) 16:00:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:58 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:00:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:58 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:00:58 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:58 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) [ 1666.341047][T32115] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1666.367760][T32115] FAT-fs (loop0): Filesystem has been set read-only [ 1666.378107][T32115] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1666.400606][T32115] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) [ 1666.415789][T32129] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1666.432470][T32129] FAT-fs (loop2): Filesystem has been set read-only [ 1666.466679][T32129] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1666.479065][T32129] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 16:00:58 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:58 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:58 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:58 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:00:59 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:00:59 executing program 3: socket$packet(0x11, 0x3, 0x300) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) [ 1667.099511][T32156] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1667.146442][T32156] FAT-fs (loop2): Filesystem has been set read-only [ 1667.167582][T32156] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1667.223088][T32156] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1667.240599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1667.246550][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:00:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 3: socket$packet(0x11, 0x3, 0x300) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:00:59 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 3: socket$packet(0x11, 0x3, 0x300) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:00:59 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, 0x0, 0x0, 0x0) 16:00:59 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, 0x0, 0x0, 0x0) 16:00:59 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:00:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, 0x0, 0x0, 0x0) 16:01:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 16:01:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(0xffffffffffffffff, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 16:01:00 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x0) 16:01:00 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:00 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:01:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1669.179290][T32259] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1669.208446][T32259] FAT-fs (loop4): Filesystem has been set read-only [ 1669.229870][T32259] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:01:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x0, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:01:01 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:01 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x0, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:01:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x0, 0xb6}, 0x80, 0x0}}], 0x1, 0x0) 16:01:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@caif=@dgm={0x25, 0x9}, 0x80, 0x0}}], 0x1, 0x0) 16:01:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, 0x0, 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:03 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:04 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(0xffffffffffffffff) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:04 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) 16:01:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x8, 0xa, @any=0x3f000000, 0x4}, 0x80, 0x0}, 0x0}], 0x1, 0x0) 16:01:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:05 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) 16:01:05 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:06 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:06 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(0x0, 0x0) 16:01:06 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1674.678645][T32507] FAT-fs (loop5): bogus number of reserved sectors [ 1674.720083][T32507] FAT-fs (loop5): Can't find a valid FAT filesystem 16:01:07 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) dup(0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:07 executing program 5: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)) [ 1675.932563][T32553] FAT-fs (loop5): bogus number of reserved sectors [ 1675.944004][T32553] FAT-fs (loop5): Can't find a valid FAT filesystem 16:01:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)) 16:01:08 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)) 16:01:08 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) 16:01:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) dup(0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:08 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) fchdir(0xffffffffffffffff) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) 16:01:09 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:09 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:09 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) dup(0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1678.283329][T32632] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1678.307490][T32627] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1678.317554][T32632] FAT-fs (loop5): Filesystem has been set read-only 16:01:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) [ 1678.327587][T32627] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 0) [ 1678.410253][T32626] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF 16:01:10 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:10 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:10 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:11 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1678.997230][T32650] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1679.010147][T32650] FAT-fs (loop4): Filesystem has been set read-only [ 1679.020198][T32650] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = semget$private(0x0, 0x1, 0xfffffffffffffffd) semtimedop(r1, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)) 16:01:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:11 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) utimes(&(0x7f0000000040)='./file0\x00', 0x0) 16:01:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:11 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401, 0x26, 0xd1f}) write$binfmt_aout(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r4, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") unlink(&(0x7f0000000040)='./bus\x00') sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86210500ceec7be070") madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x10) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x10) 16:01:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000240)) 16:01:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1680.117622][T32702] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1680.148660][T32696] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1680.177737][T32702] FAT-fs (loop5): Filesystem has been set read-only [ 1680.181702][T32696] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:01:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r2, 0x1, 0x8, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001d00)='team\x00') recvmsg(0xffffffffffffffff, 0x0, 0x120ff) getsockname$packet(r1, &(0x7f0000001880), &(0x7f00000018c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001900)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000001a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, &(0x7f0000001b40)) accept4$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001780)='nbd\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000001c00)={@mcast1}, &(0x7f0000001c40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001dc0)={{{@in=@empty, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001f00)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, 0x0, &(0x7f0000001f80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002080)={{{@in6=@ipv4={[], [], @initdev}, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000002180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000021c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000022c0)=0xe8) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 1680.353463][T32696] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 16:01:12 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) [ 1680.467130][T32696] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1680.607019][T32729] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:01:12 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) [ 1680.650343][T32692] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1680.675579][T32716] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1680.705536][T32716] FAT-fs (loop4): Filesystem has been set read-only 16:01:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@newtaction={0x14, 0x30, 0x401}, 0x14}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1680.746265][T32729] bond0: Releasing backup interface bond_slave_1 [ 1680.752430][T32716] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1680.774935][T32734] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:01:12 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:13 executing program 1: io_setup(0x2, &(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) syz_execute_func(&(0x7f0000000400)="64ff0941c3c4e1a5f973002645d943003a8e16649c6751bf80982912f333f344f67700c42355183c17006f01f7ccd2110688c86f") syz_execute_func(&(0x7f00000001c0)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9f2abc421b8c25cb100008da381810200262fc4c131fab200000000d9f9d8f3c4617d6f07a3d2dec461d455b1e617252500b0818f470f8686860080477c63ce3acf3e3acf3e810f69e08f4cbec5c4c2858c3f2d56c4613fc21d9e0f49af00000000fe9090ab86c4213e5377000043d9497dbf825959c4a18976149142d17f1f660f3a603d06f0ffff00c4e16d71d4d2564105ba16f2aed9fdfeebf5eba225adeab413c4c37d096208c2ef0008e4a25600b150400f381da94de001cce8d5c6d591c4226d05b8229a24ddffff6663e4b6c442f191047b8f49580197feffff7fc421791385920000004080a009210000df3b7d0f12e4260fe88c4200000000ca30cac46190546104f3450f2c6b0009912af3430fc4c17829c8c463ad0b5890ca6c470f43f5d8008f85856d6d8175ef9d8f000000c462a5c4a27d244fc76e0bc4a17a4295f046839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c1002470fae52c30606b2aa24660f0d5324f7a698b900008374fb0a07c40155f64e06f247aceced8fca781012322333336b82e262632097972c2c045c0b47cc815c5c9f9f140f0f2eaf46e16dc481635a9c70d3813811c4a1781365f8d7fbfbc941ec0fadd5663ef0430fabb90800000045ee880c0000003422") 16:01:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 16:01:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 16:01:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:13 executing program 5: r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x800, 0x1}, 0x20) 16:01:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1) fallocate(r2, 0x3, 0xffffbffffffffa6d, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x2, 0x0, @local}, 0xfffffe91) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, 0x0) umount2(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000500)={0x6c, 0x0, {0x3, 0x2, 0xffffffff80000000, 0x3}}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000380)={@local}) stat(0x0, 0x0) flock(0xffffffffffffffff, 0x4) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) getsockopt$inet6_int(r1, 0x29, 0xf, 0x0, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 16:01:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:13 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$notify(r0, 0x402, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) pivot_root(0x0, 0x0) syz_execute_func(&(0x7f0000000080)="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") openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) 16:01:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:14 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) r1 = socket$inet(0x2, 0x3, 0x3) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x6001, 0x0) 16:01:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:14 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) unlink(0x0) r0 = memfd_create(&(0x7f0000000b80)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ftruncate(r0, 0x10001) sendfile(r0, r0, &(0x7f0000000040), 0xff8) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) 16:01:14 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)=']wlan0trusted\x00') 16:01:14 executing program 3: 16:01:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:14 executing program 1: [ 1682.424966][ T328] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1682.453221][ T328] FAT-fs (loop4): Filesystem has been set read-only 16:01:14 executing program 3: 16:01:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) [ 1682.472514][ T328] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1682.492251][ T328] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="5007000090780000"], 0x0) 16:01:15 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14}, 0xfffffff4) r1 = socket$inet(0x2, 0x3, 0x3) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x6001, 0x0) 16:01:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) msgsnd(0x0, &(0x7f0000000300)={0x3}, 0x8, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adce6123c053f319bd070") msgrcv(0x0, &(0x7f0000004480)={0x0, ""/4096}, 0x1008, 0x0, 0x0) 16:01:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:15 executing program 3: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, &(0x7f0000000380), 0x0) 16:01:15 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:15 executing program 1: 16:01:15 executing program 3: 16:01:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:15 executing program 3: 16:01:15 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r1, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:15 executing program 1: [ 1683.919817][ T407] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1683.930064][ T407] FAT-fs (loop4): Filesystem has been set read-only [ 1683.937109][ T407] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1683.949008][ T407] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:16 executing program 5: 16:01:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:16 executing program 3: 16:01:16 executing program 1: 16:01:16 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r1, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:16 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:16 executing program 3: 16:01:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:16 executing program 1: 16:01:16 executing program 5: 16:01:16 executing program 3: 16:01:16 executing program 5: 16:01:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:16 executing program 1: 16:01:16 executing program 3: 16:01:16 executing program 5: 16:01:17 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r1, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:17 executing program 3: 16:01:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:17 executing program 1: 16:01:17 executing program 5: 16:01:17 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:17 executing program 3: 16:01:17 executing program 1: 16:01:17 executing program 5: 16:01:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:17 executing program 3: 16:01:17 executing program 5: 16:01:17 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:17 executing program 5: 16:01:17 executing program 1: 16:01:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:17 executing program 3: [ 1685.372211][ T465] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1685.383168][ T465] FAT-fs (loop4): Filesystem has been set read-only [ 1685.392545][ T465] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1685.757683][ T491] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1685.767087][ T491] FAT-fs (loop4): Filesystem has been set read-only [ 1685.774786][ T491] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1685.784372][ T491] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:18 executing program 1: 16:01:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:18 executing program 3: 16:01:18 executing program 5: 16:01:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:18 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:18 executing program 5: 16:01:18 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, 0x0, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000400)={0x3, 0x1c, [0xdb, 0xb4, 0x100000001, 0x1, 0x4, 0x614c, 0x6]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c12e33e9bd070") setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000002580)="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", 0x505}], 0x1}}], 0x1, 0x24000004) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x201, 0x0) 16:01:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:18 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x3) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) sched_setaffinity(0x0, 0xffffff62, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000000000006, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x519) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 16:01:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') [ 1686.196149][ T2916] libceph: connect [d::]:6789 error -101 [ 1686.207315][ T2916] libceph: mon0 [d::]:6789 connect error 16:01:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) [ 1686.243293][T22235] libceph: mon1 [::1]:6789 socket error on write 16:01:18 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, 0x0, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000400)={0x3, 0x1c, [0xdb, 0xb4, 0x100000001, 0x1, 0x4, 0x614c, 0x6]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c12e33e9bd070") setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000002580)="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", 0x505}], 0x1}}], 0x1, 0x24000004) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x201, 0x0) 16:01:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'ip6erspan0\x00', 0x12}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x1) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 16:01:18 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, 0x0, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000400)={0x3, 0x1c, [0xdb, 0xb4, 0x100000001, 0x1, 0x4, 0x614c, 0x6]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c12e33e9bd070") setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000002580)="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", 0x505}], 0x1}}], 0x1, 0x24000004) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x201, 0x0) [ 1686.772453][ T2916] libceph: mon1 [::1]:6789 socket error on write 16:01:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:19 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, 0x0, &(0x7f0000000240)) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000400)={0x3, 0x1c, [0xdb, 0xb4, 0x100000001, 0x1, 0x4, 0x614c, 0x6]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c12e33e9bd070") setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f0000003580)=[{&(0x7f0000002580)="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", 0x505}], 0x1}}], 0x1, 0x24000004) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x201, 0x0) 16:01:19 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:19 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="04"], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 16:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, 0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, 0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1000000000000e) ioctl$TCSETS(r0, 0x5423, &(0x7f0000000040)) 16:01:19 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="04"], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 1687.525027][ T585] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1687.558473][ T585] FAT-fs (loop0): Filesystem has been set read-only [ 1687.572198][ T585] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:01:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, 0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:19 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="04"], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 16:01:19 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0}, {}, {}], 0x3, 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_read_part_table(0x0, 0x0, 0x0) 16:01:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:19 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="04"], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) [ 1687.804411][ T2916] libceph: mon1 [::1]:6789 socket error on write 16:01:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:20 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0xee00, 0x0) 16:01:20 executing program 1: ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) request_key(&(0x7f0000000140)='big_key\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0xfffffffffffffff9) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stack\x00') creat(&(0x7f0000000000)='./file0\x00', 0x100) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1688.159259][ T621] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1688.182592][ T621] FAT-fs (loop0): Filesystem has been set read-only [ 1688.216802][ T621] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:01:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 16:01:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x8003) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) [ 1688.257497][ T637] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1688.310916][ T637] FAT-fs (loop4): Filesystem has been set read-only [ 1688.355747][ T637] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1f4, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) 16:01:20 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x8003) accept4$vsock_stream(r2, 0x0, 0x0, 0x0) 16:01:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONE(r0, 0x40049409, r0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000200)="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") sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="00002cbd7000fedbdf251100000008000400000000800800040005000000600002000800090004000000080002004e20000008000600ffffff7f080005000200000008000500fe0e000008000500050000000800030002000000080002004e230000080005001f00000014000100000000000000000000000000000000001800010014000300ff010000000000000000000000000001"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000180)={0x0, 0x6, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) 16:01:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r0, &(0x7f0000000200), 0x400000000000084, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 16:01:20 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1689.008382][ T680] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) 16:01:21 executing program 1: pause() syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3420f1afc3a8e16649c674699ec12b6e5f30f53d4f4ac4502b4ddb4dd003e41e6fff267812865566666") syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="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") 16:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') [ 1689.075176][ T680] FAT-fs (loop4): Filesystem has been set read-only [ 1689.101502][ T680] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:21 executing program 4: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) 16:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) 16:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) [ 1689.569063][ T715] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1689.596853][ T715] FAT-fs (loop4): Filesystem has been set read-only [ 1689.609804][ T715] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:21 executing program 2: syz_execute_func(&(0x7f0000000a00)="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") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f00000008c0)="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") 16:01:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) close(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:01:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) [ 1689.801866][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1689.811811][ T2916] libceph: connect [d::]:6789 error -101 [ 1689.817657][ T2916] libceph: mon0 [d::]:6789 connect error 16:01:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fstat(r0, &(0x7f0000000100)) 16:01:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) 16:01:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) close(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') [ 1690.079924][ T752] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1690.103720][ T752] FAT-fs (loop0): Filesystem has been set read-only [ 1690.119655][ T752] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 16:01:22 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:22 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x400, 0x0) 16:01:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) [ 1690.154586][ T747] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1690.170925][ T747] FAT-fs (loop4): Filesystem has been set read-only [ 1690.181142][ T747] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 16:01:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:01:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) close(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') [ 1690.657072][ T783] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1690.669470][ T783] FAT-fs (loop4): Filesystem has been set read-only [ 1690.678726][ T783] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 1690.850899][ T2916] libceph: connect [d::]:6789 error -101 [ 1690.856755][ T2916] libceph: mon0 [d::]:6789 connect error [ 1691.800950][ T2916] libceph: connect [d::]:6789 error -101 [ 1691.806707][ T2916] libceph: mon0 [d::]:6789 connect error [ 1692.842048][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1693.801122][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1694.841093][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1695.802111][ T2916] libceph: connect [d::]:6789 error -101 [ 1695.807837][ T2916] libceph: mon0 [d::]:6789 connect error [ 1696.851031][ T2916] libceph: connect [d::]:6789 error -101 [ 1696.856773][ T2916] libceph: mon0 [d::]:6789 connect error [ 1697.801037][ T2916] libceph: connect [d::]:6789 error -101 [ 1697.806794][ T2916] libceph: mon0 [d::]:6789 connect error [ 1698.842097][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1699.801231][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1700.841251][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1701.802732][ T2916] libceph: connect [d::]:6789 error -101 [ 1701.808557][ T2916] libceph: mon0 [d::]:6789 connect error [ 1702.840956][ T2916] libceph: connect [d::]:6789 error -101 [ 1702.846715][ T2916] libceph: mon0 [d::]:6789 connect error [ 1703.800864][ T2916] libceph: connect [d::]:6789 error -101 [ 1703.806732][ T2916] libceph: mon0 [d::]:6789 connect error [ 1704.841301][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1705.801539][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1706.841264][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1707.801957][ T2916] libceph: connect [d::]:6789 error -101 [ 1707.808084][ T2916] libceph: mon0 [d::]:6789 connect error [ 1708.841004][ T2916] libceph: connect [d::]:6789 error -101 [ 1708.846894][ T2916] libceph: mon0 [d::]:6789 connect error [ 1709.800872][ T2916] libceph: connect [d::]:6789 error -101 [ 1709.806850][ T2916] libceph: mon0 [d::]:6789 connect error [ 1710.841281][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1711.801141][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1712.841363][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1713.810938][ T2916] libceph: connect [d::]:6789 error -101 [ 1713.816693][ T2916] libceph: mon0 [d::]:6789 connect error [ 1714.840898][ T2916] libceph: connect [d::]:6789 error -101 [ 1714.846673][ T2916] libceph: mon0 [d::]:6789 connect error [ 1715.800900][ T2916] libceph: connect [d::]:6789 error -101 [ 1715.806803][ T2916] libceph: mon0 [d::]:6789 connect error [ 1716.841209][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1717.801155][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1718.841111][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1719.802580][ T2916] libceph: connect [d::]:6789 error -101 [ 1719.808826][ T2916] libceph: mon0 [d::]:6789 connect error [ 1720.840888][ T2916] libceph: connect [d::]:6789 error -101 [ 1720.847210][ T2916] libceph: mon0 [d::]:6789 connect error [ 1721.800883][ T2916] libceph: connect [d::]:6789 error -101 [ 1721.807290][ T2916] libceph: mon0 [d::]:6789 connect error [ 1722.841321][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1723.801136][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1724.842305][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1725.801837][ T2916] libceph: connect [d::]:6789 error -101 [ 1725.807764][ T2916] libceph: mon0 [d::]:6789 connect error [ 1726.840822][ T2916] libceph: connect [d::]:6789 error -101 [ 1726.846780][ T2916] libceph: mon0 [d::]:6789 connect error [ 1727.800964][ T2916] libceph: connect [d::]:6789 error -101 [ 1727.806773][ T2916] libceph: mon0 [d::]:6789 connect error [ 1728.850767][ T2916] libceph: mon1 [::1]:6789 socket closed (con state CONNECTING) [ 1729.801324][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1730.841144][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1731.801996][ T2916] libceph: connect [d::]:6789 error -101 [ 1731.808307][ T2916] libceph: mon0 [d::]:6789 connect error [ 1732.841093][ T2916] libceph: connect [d::]:6789 error -101 [ 1732.846892][ T2916] libceph: mon0 [d::]:6789 connect error [ 1733.801160][ T2916] libceph: connect [d::]:6789 error -101 [ 1733.807033][ T2916] libceph: mon0 [d::]:6789 connect error [ 1734.841304][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1735.801231][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1736.841231][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1737.801884][ T2916] libceph: connect [d::]:6789 error -101 [ 1737.807838][ T2916] libceph: mon0 [d::]:6789 connect error [ 1738.840916][ T2916] libceph: connect [d::]:6789 error -101 [ 1738.846766][ T2916] libceph: mon0 [d::]:6789 connect error [ 1739.800929][ T2916] libceph: connect [d::]:6789 error -101 [ 1739.806687][ T2916] libceph: mon0 [d::]:6789 connect error [ 1740.841406][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1741.801226][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1742.841201][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1743.801860][ T2916] libceph: connect [d::]:6789 error -101 [ 1743.807592][ T2916] libceph: mon0 [d::]:6789 connect error [ 1744.840920][ T2916] libceph: connect [d::]:6789 error -101 [ 1744.846798][ T2916] libceph: mon0 [d::]:6789 connect error [ 1745.800988][ T2916] libceph: connect [d::]:6789 error -101 [ 1745.806895][ T2916] libceph: mon0 [d::]:6789 connect error [ 1746.841697][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1747.801255][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1748.841430][ T2916] libceph: mon1 [::1]:6789 socket error on write [ 1749.802094][ T2916] libceph: connect [d::]:6789 error -101 [ 1749.807848][ T2916] libceph: mon0 [d::]:6789 connect error 16:02:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000180)="80463b91dc7d6baa45665e2b9c1eff9e500e87f67929bb9b0c679d55795b", 0x1e) 16:02:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="cf7096", 0x3) 16:02:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) 16:02:22 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:02:22 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b8"], 0xe3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r3, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f358d5b78c3d9a9c7") sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:02:22 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x36201, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) socketpair$unix(0x1, 0x3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) dup(0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_execute_func(&(0x7f0000000200)="c4637963e4fe91cd8040afe59f7dd025207dd025205bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f673ef044101d0040f6bee00000e28020626221fc51c1ea01edc48192558dc3c366450f67067c7c730fc4417173f7f226400f0d18450f0f8d34085b2c9ee3df0804f4f30f1a1254111d54111d00") ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000180)={0x5, 0x7fff, 0x0, 0x401}) write$binfmt_aout(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="0000000000000000070008100000ee8b08b7960ff7aa6e041c7700fd15873809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb74af955568576bc5a15aff94ce45ffd34ef01cb29b1229b421db3bcc3fa1eae6f1b1d0c15b22e6eb0d8608bb83b955cad9e5b56dbb18e65ec595c4b7d0e0f50b0c90abdd35b87bcc8cd0d4a7a466eda0f4d98a555ffd564927615890bd56938e6435e9467d65f4ec5aee9ed93dab3315c23ba75e5d29252ee07649b82476c8"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000280)="de4faca6d3f9dbd2bc9f1354124709e16809abc46c9e0f35") sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) 16:02:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = dup2(r0, r0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) 16:02:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="cf7096", 0x3) 16:02:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) 16:02:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x4002}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000014c0)='nr0\x01\x00`\x00\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x10\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:\x97e\xa7\x1f\xbfD\x1e\x903V#\x10\x90_\xf7\xd3=M\x80cCn=\xf2\xe1u\x83=\'\xa4\xa1V\xe47y}\xd9\xf1\xa7p\xea\x86W\xd1') 16:02:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="cf7096", 0x3) 16:02:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x33d, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}, 0x0) [ 1751.975405][T13243] device bridge_slave_1 left promiscuous mode [ 1751.985476][T13243] bridge0: port 2(bridge_slave_1) entered disabled state [ 1752.035359][T13243] device bridge_slave_0 left promiscuous mode [ 1752.042067][T13243] bridge0: port 1(bridge_slave_0) entered disabled state [ 1752.233950][T13243] device hsr_slave_1 left promiscuous mode [ 1752.275386][T13243] device hsr_slave_0 left promiscuous mode [ 1752.316064][T13243] team0 (unregistering): Port device team_slave_1 removed [ 1752.330378][T13243] team0 (unregistering): Port device team_slave_0 removed [ 1752.342667][T13243] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1752.378676][T13243] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1752.453389][T13243] bond0 (unregistering): Released all slaves [ 1753.283151][ T836] IPVS: ftp: loaded support on port[0] = 21 [ 1753.456950][ T836] chnl_net:caif_netlink_parms(): no params data found [ 1753.516053][ T836] bridge0: port 1(bridge_slave_0) entered blocking state [ 1753.529944][ T836] bridge0: port 1(bridge_slave_0) entered disabled state [ 1753.538617][ T836] device bridge_slave_0 entered promiscuous mode [ 1753.553307][ T836] bridge0: port 2(bridge_slave_1) entered blocking state [ 1753.566458][ T836] bridge0: port 2(bridge_slave_1) entered disabled state [ 1753.575835][ T836] device bridge_slave_1 entered promiscuous mode [ 1753.618306][ T836] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1753.635625][ T836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1753.669871][ T836] team0: Port device team_slave_0 added [ 1753.683367][ T836] team0: Port device team_slave_1 added [ 1753.753028][ T836] device hsr_slave_0 entered promiscuous mode [ 1753.785923][ T836] device hsr_slave_1 entered promiscuous mode [ 1753.849296][ T836] bridge0: port 2(bridge_slave_1) entered blocking state [ 1753.856427][ T836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1753.863819][ T836] bridge0: port 1(bridge_slave_0) entered blocking state [ 1753.870917][ T836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1753.932612][ T836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1753.940938][ T2916] bridge0: port 1(bridge_slave_0) entered disabled state [ 1753.949002][ T2916] bridge0: port 2(bridge_slave_1) entered disabled state [ 1753.972554][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1753.985160][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1753.995535][ T836] 8021q: adding VLAN 0 to HW filter on device team0 [ 1754.008876][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1754.018004][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1754.026937][T22235] bridge0: port 1(bridge_slave_0) entered blocking state [ 1754.034050][T22235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1754.061851][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1754.070858][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1754.079261][T29850] bridge0: port 2(bridge_slave_1) entered blocking state [ 1754.086382][T29850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1754.097948][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1754.106993][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1754.117108][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1754.125962][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1754.134465][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1754.143337][T29850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1754.157123][ T836] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1754.168527][ T836] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1754.194620][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1754.211266][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1754.219721][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1754.228802][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1754.237449][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1754.246062][T22235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1754.265114][T13243] WARNING: CPU: 0 PID: 13243 at net/xfrm/xfrm_policy.c:3873 xfrm_policy_fini+0x30c/0x3a0 [ 1754.275501][T13243] Kernel panic - not syncing: panic_on_warn set ... [ 1754.282242][T13243] CPU: 0 PID: 13243 Comm: kworker/u4:0 Not tainted 5.1.0-rc7+ #96 [ 1754.290048][T13243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1754.300217][T13243] Workqueue: netns cleanup_net [ 1754.304980][T13243] Call Trace: [ 1754.308555][T13243] dump_stack+0x172/0x1f0 [ 1754.312894][T13243] ? xfrm_policy_fini+0x290/0x3a0 [ 1754.317921][T13243] panic+0x2cb/0x65c [ 1754.321823][T13243] ? __warn_printk+0xf3/0xf3 [ 1754.326433][T13243] ? xfrm_policy_fini+0x30c/0x3a0 [ 1754.331477][T13243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1754.337808][T13243] ? __warn.cold+0x5/0x45 [ 1754.342135][T13243] ? __warn+0xe8/0x1d0 [ 1754.346212][T13243] ? xfrm_policy_fini+0x30c/0x3a0 [ 1754.351335][T13243] __warn.cold+0x20/0x45 [ 1754.355596][T13243] ? xfrm_policy_fini+0x30c/0x3a0 [ 1754.360632][T13243] report_bug+0x263/0x2b0 [ 1754.365085][T13243] do_error_trap+0x11b/0x200 [ 1754.369687][T13243] do_invalid_op+0x37/0x50 [ 1754.374109][T13243] ? xfrm_policy_fini+0x30c/0x3a0 [ 1754.379254][T13243] invalid_op+0x14/0x20 [ 1754.383425][T13243] RIP: 0010:xfrm_policy_fini+0x30c/0x3a0 [ 1754.389064][T13243] Code: c3 e8 58 fa 68 fb 0f 0b e9 49 fe ff ff e8 4c fa 68 fb 0f 0b e9 cd fd ff ff e8 40 fa 68 fb 0f 0b e9 00 ff ff ff e8 34 fa 68 fb <0f> 0b e9 62 fd ff ff e8 c8 10 a1 fb e9 7d fe ff ff 4c 89 ff e8 db [ 1754.408667][T13243] RSP: 0018:ffff88805df57bb0 EFLAGS: 00010293 [ 1754.414737][T13243] RAX: ffff8880a08566c0 RBX: ffff88809fe21b70 RCX: 1ffff1101410adf6 [ 1754.422723][T13243] RDX: 0000000000000000 RSI: ffffffff8607927c RDI: ffff8880a0856f3c [ 1754.430718][T13243] RBP: ffff88805df57bf0 R08: ffff8880a08566c0 R09: ffff8880a0856fb0 [ 1754.438706][T13243] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88809fe200c0 [ 1754.446675][T13243] R13: ffff88805df57cc8 R14: ffffffff893eaad8 R15: dffffc0000000000 [ 1754.454666][T13243] ? xfrm_policy_fini+0x30c/0x3a0 [ 1754.459705][T13243] ? xfrm_policy_fini+0x3a0/0x3a0 [ 1754.464739][T13243] xfrm_net_exit+0x1d/0x70 [ 1754.469175][T13243] ops_exit_list.isra.0+0xb0/0x160 [ 1754.475367][T13243] cleanup_net+0x3fb/0x960 [ 1754.479800][T13243] ? netns_install+0x1d0/0x1d0 [ 1754.484582][T13243] process_one_work+0x98e/0x1790 [ 1754.489526][T13243] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1754.494948][T13243] ? lock_acquire+0x16f/0x3f0 [ 1754.499651][T13243] worker_thread+0x98/0xe40 [ 1754.504165][T13243] kthread+0x357/0x430 [ 1754.508226][T13243] ? process_one_work+0x1790/0x1790 [ 1754.513426][T13243] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1754.519981][T13243] ret_from_fork+0x3a/0x50 [ 1754.526507][T13243] Kernel Offset: disabled [ 1754.531150][T13243] Rebooting in 86400 seconds..