0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x101, 0x4, {0xfffffffd, 0x0, 0x5}}) r4 = dup(r1) write$UHID_DESTROY(r4, &(0x7f0000000200), 0xffffff77) setsockopt(r4, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4) 03:30:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x600}, 0x1c) 03:30:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0xffffff9e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 358.985474][T15610] IPVS: ftp: loaded support on port[0] = 21 [ 359.169635][ T3797] usb 2-1: new high-speed USB device number 30 using dummy_hcd 03:30:16 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:30:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x700}, 0x1c) 03:30:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0xffffffef, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') [ 359.569380][ T3797] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 359.583667][ T3797] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 359.593568][ T3797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.615570][ T3797] usb 2-1: config 0 descriptor?? 03:30:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x900}, 0x1c) 03:30:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0xfffffff0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 359.679568][ T289] tipc: TX() has been purged, node left! 03:30:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x101, 0x4, {0xfffffffd, 0x0, 0x5}}) r4 = dup(r1) write$UHID_DESTROY(r4, &(0x7f0000000200), 0xffffff77) setsockopt(r4, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4) 03:30:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r0, r1) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') [ 359.889266][T15681] IPVS: ftp: loaded support on port[0] = 21 [ 359.969228][ T3797] usbhid 2-1:0.0: can't add hid device: -71 [ 359.994665][ T3797] usbhid: probe of 2-1:0.0 failed with error -71 [ 360.030301][ T3797] usb 2-1: USB disconnect, device number 30 03:30:17 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xa00}, 0x1c) 03:30:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:17 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)={0x7, 0x1, 0x5, 0xf9d2, 0x80000001, 0x3}) creat(&(0x7f0000000100)='./bus\x00', 0x0) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') 03:30:17 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:17 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x21a, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}, {{{0x9, 0x5, 0x81, 0x3, 0x400}}}}}]}}]}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x1420000a7a, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)=0x0) ptrace(0x4208, r5) syz_usb_control_io$hid(r0, 0x0, 0x0) r6 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000000404c05d50340000000000109022400010000000009040000010301000009210000000122010009058103"], 0x0) syz_usb_control_io$hid(r6, 0x0, 0x0) syz_usb_control_io(r6, &(0x7f0000000200)={0x2c, &(0x7f0000000000)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r6, &(0x7f0000000100)={0x24, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x0}, 0x0) [ 360.698024][T15748] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 03:30:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf00}, 0x1c) 03:30:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:17 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "97a9a2327fdd8a5f", "ac70c7bd480084e732983eb91719fe5a", "57b5e474", "a549e17692f8ae46"}, 0x28) [ 360.968899][ T2474] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 360.980713][T15746] IPVS: ftp: loaded support on port[0] = 21 03:30:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) [ 361.079465][ T3797] usb 1-1: new high-speed USB device number 11 using dummy_hcd 03:30:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 361.279132][ T2474] usb 2-1: device descriptor read/64, error 18 [ 361.329087][ T3797] usb 1-1: Using ep0 maxpacket: 16 [ 361.470389][ T3797] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 361.512995][ T3797] usb 1-1: New USB device found, idVendor=05ac, idProduct=021a, bcdDevice= 0.40 [ 361.586298][ T3797] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 361.626057][ T3797] usb 1-1: config 0 descriptor?? [ 361.698936][ T2474] usb 2-1: device descriptor read/64, error 18 [ 361.988816][ T2474] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 362.200263][T15816] udc-core: couldn't find an available UDC or it's busy [ 362.207228][T15816] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 362.288874][ T2474] usb 2-1: device descriptor read/64, error 18 [ 362.698904][ T2474] usb 2-1: device descriptor read/64, error 18 [ 362.798848][ T289] tipc: TX() has been purged, node left! [ 362.820259][ T2474] usb usb2-port1: attempt power cycle [ 362.958951][ T289] tipc: TX() has been purged, node left! [ 363.558900][ T2474] usb 2-1: new high-speed USB device number 33 using dummy_hcd 03:30:20 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2000}, 0x1c) 03:30:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:20 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1a, 0x1, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x80, 0x2, 0x8, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0x29, 0x1d, 0x11, 0x16, 0x6, 0xc9, 0x2, 0xdb}) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') socketpair(0x12, 0x4, 0x70b92ffb, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x6, {{0x2, 0x4e23, @multicast2}}}, 0x88) [ 363.688888][ T2474] usb 2-1: device descriptor read/8, error -71 03:30:20 executing program 0: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2ee0}, 0x1c) [ 363.849446][ T3797] usbhid 1-1:0.0: can't add hid device: -71 [ 363.855489][ T3797] usbhid: probe of 1-1:0.0 failed with error -71 03:30:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 363.899472][ T2474] usb 2-1: device descriptor read/8, error -71 [ 363.956365][ T3797] usb 1-1: USB disconnect, device number 11 [ 364.032840][T15828] IPVS: ftp: loaded support on port[0] = 21 03:30:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x4000}, 0x1c) 03:30:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 364.233769][T15844] IPVS: ftp: loaded support on port[0] = 21 [ 364.394465][ T2474] usb 2-1: new high-speed USB device number 34 using dummy_hcd 03:30:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x4102}, 0x1c) [ 364.495299][ T2474] usb 2-1: Invalid ep0 maxpacket: 0 [ 364.501509][ T2474] usb usb2-port1: unable to enumerate USB device 03:30:23 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:23 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') 03:30:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x9, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:23 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x5400}, 0x1c) 03:30:23 executing program 5: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00') 03:30:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 367.218864][ T3797] usb 2-1: new high-speed USB device number 35 using dummy_hcd 03:30:23 executing program 5: stat(&(0x7f0000000000)='./bus\x00', &(0x7f00000002c0)) creat(&(0x7f0000000100)='./bus\x00', 0x0) link(&(0x7f0000000200)='./bus\x00', &(0x7f0000000280)='./bus\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a7a, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) ptrace$getsig(0x4202, r3, 0x0, &(0x7f0000000180)) 03:30:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x5800}, 0x1c) 03:30:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xb, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 367.444161][T15968] IPVS: ftp: loaded support on port[0] = 21 03:30:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x80fe}, 0x1c) [ 367.528815][ T3797] usb 2-1: device descriptor read/64, error 18 03:30:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 367.939256][ T3797] usb 2-1: device descriptor read/64, error 18 [ 368.208895][ T3797] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 368.273302][T11021] tipc: TX() has been purged, node left! [ 368.498928][ T3797] usb 2-1: device descriptor read/64, error 18 [ 368.898794][ T3797] usb 2-1: device descriptor read/64, error 18 [ 369.018989][ T3797] usb usb2-port1: attempt power cycle 03:30:26 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xb804}, 0x1c) 03:30:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xd, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:30:26 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) socket(0x10, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="702a3a3ca62f904d6e7891d1ec700fd30b374aba94fd683918ffffffffffff0000000000"]) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, 'xfs\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r4, 0x0, 0x1420000a7a, 0x0) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000040)) [ 369.758926][ T3797] usb 2-1: new high-speed USB device number 37 using dummy_hcd 03:30:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 369.868694][T16031] xfs: Unknown parameter 'p*:<¦/Mnx‘ÑìpÓ 7Jº”ýh9ÿÿÿÿÿÿ' 03:30:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xc4ff}, 0x1c) [ 370.079774][T16029] IPVS: ftp: loaded support on port[0] = 21 03:30:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 370.271483][T16032] IPVS: ftp: loaded support on port[0] = 21 [ 370.279129][ T3797] usb 2-1: device not accepting address 37, error -71 03:30:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe02e}, 0x1c) 03:30:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x10, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe803}, 0x1c) [ 370.649729][T16031] xfs: Unknown parameter 'p*:<¦/Mnx‘ÑìpÓ 7Jº”ýh9ÿÿÿÿÿÿ' [ 370.659653][ T3797] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 370.767216][ T310] tipc: TX() has been purged, node left! [ 370.888996][ T3797] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 370.907296][ T3797] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 370.918308][ T3797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 370.950225][ T3797] usb 2-1: config 0 descriptor?? [ 371.010860][ T3797] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 371.226207][ T12] usb 2-1: USB disconnect, device number 38 03:30:28 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:28 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:30:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x11, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:28 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140), 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="720000001ac26b01a5fcdc4ee452a5f1a91795c6e661dec48759ce94e3bae21999243f4b3ee88939d47b4b8ad196752ddb93011728984ed21c605e0e1f07eb59445f886ba9c4d3861a976011d053a15895c6415f0c927e698960390123679caca83aeb", @ANYRES16=0x0, @ANYBLOB="00002bbd7000fbdbdf25010000000800020053400000050005000100000008000300010400000800030008000000080002000800000014000100000000000000000000000000000000000800020080000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x4000000000000, 0x6, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x1]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e20, @local}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) write$smack_current(0xffffffffffffffff, &(0x7f0000000300)={'/dev/kvm\x00'}, 0xa) accept$ax25(0xffffffffffffffff, &(0x7f0000000500)={{0x3, @null}, [@bcast, @netrom, @default, @bcast, @bcast, @default, @default, @rose]}, &(0x7f0000000640)=0x48) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000740)={[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:30:28 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a7a, 0x0) setsockopt(r0, 0x3, 0x4, &(0x7f0000000300)="39592eacd8e7b40bc29beadf16d0e1310436d8d937bb2a616b356307c4c29c1603946efada78d1568615cb444795ad6029eafafa981678d94c293f155c833a725b07ffb63dbfd75355e6a48f567b741bd96a390f53b6255cf0031522d152dc077d516dd00f25bf698a789d61a07e8580af16036dba4df459d4c112c8bf8864dbb81cc46f35cc2ddc536c0f", 0x8b) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000006d700edff000061115c0000070000400000b000000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f00000000c0)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000b9000000b900000006000000090000000000000c05000000000000000000000300000000020000000500000059d10000080000000000000e0400000001000000050000000800000f010000000100000005000000060000000300000001978c820927a8775d09b1000000020000000400000006000000060000000125ba5bdaa875b3889ab6000000ffffffff000000000300000008000000fdf2cee704010000ff0300000300000001000000e1ffffff1f00000074fd381fa77958fe0400000000000000050000000d0c000000000000070000000007000000000000"], &(0x7f00000001c0)=""/238, 0xda, 0xee}, 0x20) 03:30:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf401}, 0x1c) 03:30:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=""/171, 0xab}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/vlan/config\x00') preadv(r0, &(0x7f00000017c0), 0x159, 0x300) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/udplite6\x00') write$UHID_DESTROY(r2, &(0x7f0000000040), 0x4) 03:30:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x12, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfc00}, 0x1c) [ 372.172026][T16142] IPVS: ftp: loaded support on port[0] = 21 03:30:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@inode64='inode64'}, {@bsdgroups='bsdgroups'}, {@lazytime='lazytime'}]}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000280)={0x7, 'team_slave_1\x00', {0x1}, 0x3}) mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f0000000180)={'trans=virtio,', {[{@aname={'aname'}}], [{@dont_measure='dont_measure'}]}}) 03:30:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x25, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 372.309228][ T3797] usb 2-1: new high-speed USB device number 39 using dummy_hcd 03:30:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfe80}, 0x1c) [ 372.440486][T16175] 9pnet_virtio: no channels available for device syz [ 372.477129][T16166] XFS (loop0): Invalid superblock magic number [ 372.699221][ T3797] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 372.753837][ T3797] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 372.794566][ T3797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 372.835543][ T3797] usb 2-1: config 0 descriptor?? [ 372.897579][ T3797] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 372.914941][T16175] XFS (loop0): Invalid superblock magic number [ 372.960049][T16224] 9pnet_virtio: no channels available for device syz [ 373.098234][ T3796] usb 2-1: USB disconnect, device number 39 [ 373.188827][ T310] tipc: TX() has been purged, node left! [ 373.329653][ T310] tipc: TX() has been purged, node left! 03:30:30 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x60, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff00}, 0x1c) 03:30:30 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) 03:30:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0xfffffffffffffe8b) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x0, 0xf}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0) [ 373.904969][T16246] IPVS: ftp: loaded support on port[0] = 21 03:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff0f}, 0x1c) [ 374.129016][ T2512] usb 2-1: new high-speed USB device number 40 using dummy_hcd 03:30:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000001880)={0x14, r1, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7fffffff, 0x2000) write$P9_RWRITE(r2, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x8}, 0xb) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) 03:30:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x139, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) 03:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffc4}, 0x1c) [ 374.400156][T16270] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:30:31 executing program 0: mkdir(&(0x7f0000000100)='./bus/../file0\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r5, 0x0, 0x1420000a7a, 0x0) ioctl$KDSETMODE(r4, 0x4b3a, 0x0) setfsuid(r3) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) [ 374.533713][ T2512] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 374.579917][ T2512] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 374.591485][ T2512] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 374.602829][ T2512] usb 2-1: config 0 descriptor?? [ 374.640986][ T2512] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 374.758706][T16308] overlayfs: failed to resolve './file1': -2 [ 374.844867][ T2512] usb 2-1: USB disconnect, device number 40 [ 375.445017][T16290] overlayfs: failed to resolve './file1': -2 03:30:32 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) r1 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x4000, 0x120, 0x1e}, 0x18) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x300, 0x93e5, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004820}, 0x8000) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0x3fa, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000300)={0x200, 0x0, 0x22, "81040e8d5d0402bf32bfa68dbf3ff0ad070423f09f8e687e1d00b30f3c8a39331d60af0428234ac08e3aee77a56666eacf4f874e30541ee9c905f6d6", 0x3, "433f09751eed57f6f1181987cfe98cae62955c04c9826db6b76a567e3390d9ffa6e010b9cf9c2c8ff31ad6e5aa3b8b8324dee7edbe2a93b93407840f", 0x20}) 03:30:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x34000}, 0x1c) 03:30:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x300, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:32 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x290a00) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="ce51ad2a6c5b84e6e14489", 0xb}, {&(0x7f0000000180)="8b10f5f802e0b57dca3039831cfe4054b5fe6e06cea5f95cd254412f8e71752391c4dba6cd9532c7cce8bf968286ec41dddee33247bbd85e", 0x38}], 0x2, &(0x7f0000000380)=[@hopopts={{0x68, 0x29, 0x36, {0x16, 0x9, [], [@enc_lim={0x4, 0x1, 0x6}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @calipso={0x7, 0x20, {0x3, 0x6, 0x3, 0x8000, [0x0, 0x1, 0x2]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim={0x4, 0x1, 0x4}]}}}, @dstopts_2292={{0xa0, 0x29, 0x4, {0x5c, 0x10, [], [@generic={0x7, 0x78, "11ba6406e1569cd19fba16d28fec4b35b7ddd70787d244749fee8a59e0591be8c92b9a8304c8a87d4b4d297e2ce2530480c369b176fcd3c0a8a3e2df91459a7a841c16d524780905674edaf15ea6ad3c6e899d7c5ffb0ee5a8d813d2aed438cbf357ba46d5d5a65cec26109a2daeff8ef3b28a2e0f2a7f65"}, @ra={0x5, 0x2, 0xffff}, @enc_lim={0x4, 0x1, 0x33}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x3e, 0x1, [], [@ra={0x5, 0x2, 0x400}, @jumbo={0xc2, 0x4, 0xf9}, @enc_lim={0x4, 0x1, 0x7}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfe}}, @hopopts={{0xe8, 0x29, 0x36, {0x2, 0x19, [], [@enc_lim={0x4, 0x1, 0x1}, @generic={0x0, 0x8, "4f988e952f776321"}, @calipso={0x7, 0x28, {0x2, 0x8, 0x2, 0x8, [0x80000001, 0x992, 0x3, 0x646]}}, @generic={0x6, 0x5a, "6ab39bec8814a1de685d6a8bb12e3773517688fb58e62abeb862288fb69dbbc09e62d4171b90b4ebabb6ddf5f5aae40dce46c80fec7de17b761aeef8383452015cdf76b128d49b3568200e19739d4eb8b5532a782dd2bf5b9b0e"}, @pad1, @hao={0xc9, 0x10, @empty}, @hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0x8001, [0xffffffffffffffd0]}}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x3a, 0x8, 0x1, 0x19, 0x0, [@private0, @private0, @mcast2, @empty]}}}, @dstopts={{0x38, 0x29, 0x37, {0x32, 0x3, [], [@calipso={0x7, 0x18, {0x0, 0x4, 0x80, 0x7f, [0x5, 0x2800000000000000]}}]}}}, @rthdrdstopts={{0x18, 0x29, 0x37, {0x11}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffffffff}}, @rthdr={{0x48, 0x29, 0x39, {0x18, 0x6, 0x1, 0x6, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0={0xfc, 0x0, [], 0x1}, @local]}}}], 0x338}, 0x4000) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000040)=r7) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9, 0x1, 'xfrm\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x3}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x3}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x54}}, 0x0) [ 375.680298][T16333] bond0: (slave xfrm1): ether type (65534) is different from other slaves (1), can not enslave it 03:30:32 executing program 5: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0xfffffffffffffffd, 0x0) clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="b70200000b400000bfa300000000000024020000fffeffff7a03f0fff8e2ffff79a4f0ff00000000b7060000ffffffff2d640500000000007502faff07cd02000404000001007d60b7030000001000106a0a00fe000000008500000026000000b70600000000004295000000000000001da5ad3548ebb63d18db6a1c72821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff2d5ac60c2ceaea4c1dc908abb6e7325ec1956b01660bf36628dff1a15750ab9a577914780001000000000000d4bf814f01f2cd519e078d4ffab418e4682b2aec5e4a356220b67f4182f32333b08c6e497687e10a35aea5cac0ceafdb9a2eeb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b783ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0c330a5bb8c13d5b47975b4b13b9f35e4f41a8566fa34881aa762df9b4c03e53466fa4f22d8c1af439166848b419f95489ee53da177e537460ca46abba8652c1df2a44b027dd571b7ee86a75bb32935f542127a8f8438feecbb1c757f7169f006f3f565b677fbd0b14b3625962905ef911785c88a6084d676d8ef8a6d64a2363682e5d067e0a769c0a606636c9f4a4413c098f4fcc9661c80c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c4364333af9a9d91c3e41ac37a63f85ad8f32b70a80ceaf6c6ed2786f6af696ace69dfa299cff6983d6155db11de1adc4b153c989ef100bbf76063e1c443b0b73d70e9c3d7b90aecf4b512200000002406333c890923a797e00b75481739952fe87fc9ce1fea3f6ac0d7025759d4b45577c205c70631e8ad585951950e521f4e210b6494e30000000000000000cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d933892378983919088383268324a25df14010c8ed60000000044a99e697c09989a47d2cc711aee517a38b104c0982292213bd9b9545f66fd2e7268c8f984164617976092dc5a2ee0280e0ad81db3522f5b42fdbda88532b59e51243afeb553d7f39ce6dbb74e8cd2f2e1b122c30b14214a3f4b82550761638d21b06991a6491df997df2f213e8ca9d4a5102abdb4e251081aea9d3632601042959e63cf1ca2ce6e3276a8bfbea9e37c82277aaa4f0b09f60b1047cc41758bbc957a338d5355fbdf41615ce044dfbc71c7b1526e44c88a76bb0b6c072fed3cc4d34310f988a90fe5bc6b7aeb6e90c5bcf9c6d8b66172aaff5a1347c8d8000000000000000000009daa19ab24b2871a88da33e552db58892ed9ac0a0db4a8fddb8a6ca03835bf8cf380f7334f8c665b6007001e15a936325f8aabe51f2d1c6d7c8c29c4416f348016246ff2e22ba3c54f03b10d32e3d6daf2d068e75af752ff63947e008bcfb542bad7b64b4862ddb5740194fa36acc84eb4a18438f980b59d08f32197992f10a51458981305682e2693fa840e84bc00898c8be281eaed3ac6857012bd04e39f70060000ab95000800003029126ab9bc883b10d561d24e8825f90f02763be4d80566f8136e7deb89de7cd8aa502440c807000c75937af5f06637df4ba2d4c173cd8bd74498a0d885bc684dbb5699cfb8cf806716c433d6d58e2abd721f8c96724f0d9c323c084ef3b3336f718c18ed9df59c158d6af663ced6e88811efc5ead0ffd3ae2992091e814d96d8ef8540768f0000008f6923208f4cf2dc0900000083680ccf559a887d8cb1ff64d9bb92c2f4158fad9600740ecb3d94bb12aeb21fe823f7dc319a87a19e982a49d5b517cbc09f65778a042c4856f8957b826678a73195db24054d026db14d1cb6b20000000000000000003088d4b65eedddd91c453deae36fae6782bbcc26f2500ed38c1c97e916766aa49143990fb327c72d9b97a36fe97ca4c6f4f1748da5cbbc46c68100000000000066566a6e84f21e8fe3706183af6bfc36384c836d59065b834d369b2c0b66d3acb332e26cda014fa95ff8eb23c16144a5224d092fbac3eb2b40"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) r2 = gettid() tkill(r2, 0x27) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xffffffffffffffff]}, &(0x7f0000000080), 0x8) [ 375.792484][T16332] IPVS: ftp: loaded support on port[0] = 21 03:30:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x500, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x40000}, 0x1c) 03:30:32 executing program 0: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000180)=ANY=[@ANYBLOB="120100000c3d364064190100d42bfc92000109fa0b2c0c000000000b007b90d9c252e18e0151e5f996f393427abd2055ab17a21a8c8efede1504dc64d8cfce05c9ed686846ec8100ec7187daad7ee7a8eb17004b7b208d0360a5179aa2e2c001fea3f0849d6ca322"], 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x8, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0xb7) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffa) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x0, 0x0, 0x5}}}}]}, 0x78}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x5d0, 0x13, 0x8, 0x70bd2b, 0x25dfdbff, {0x25, 0x13, 0x6, 0x20, {0x4e23, 0x4e21, [0x4, 0xfffffff8, 0x5, 0x220], [0x8, 0x9, 0xe10, 0x9], r4, [0x9, 0x8]}, 0x10001, 0x2}, [@INET_DIAG_REQ_BYTECODE={0xc2, 0x1, "a42d6507aeb719a4f792507e62bb20b5ff1649f371c0f6df90371a2a8b6c9de92bf19626e3f86b04ef971d3ac2fae462490c763a67f7b5caff729410034b8fe515f174156fedd24b79d9b8be75609844732d978e3db89400bba036937120d37d7383bc7bc3eaa71cc3f0afc83d6e2e65582234545b6eb182409538e2eb3e024b1a718a51c4c89b9ab535f0f6db9575301b253bb5fe409def8daa5529af4f0273bb815ecb280e99de811ac865f7cc8e3a7ae03efe071bb4d45ed798cb5e2d"}, @INET_DIAG_REQ_BYTECODE={0x34, 0x1, "9229bc1286ea4049e4cdaf5bda54c3c503416ac04751d8d2e16b89993598b6e6990e61c44031d5776a98522a04ead018"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "fed6b79a1daa5550e1c9fd8acb1589c67cde5966e452395a51cb2245fbb6a4395e3734a6a40349bec72918ca8258337f8f33ae8328aa4dd9c6444231cceaebde4c7bf52afe47facf69f6ad75417094c810578ab74d6648cb3cf708cf693ff76204599e7bde21d9733145675cc73d93502b45ae62"}, @INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "68872b0501f5f030097b2be58580695fbb00bac43b666b3762eb2a09e964d0aa3ee6de5522947597691fa87bcd9f85bde5c209a2ad88d59b8bf77c4d77a24b1f2696e683d5c56c7e5f49b3eb0b244c17583b72a5baa5422af9b4bed742cc01419f7cdc89281e426cd54dc274720076c86f14e076747ded4c020951a54d7b5aa40bf801470b1a00e72c1eda73ecd3d3885bde4b407c31f2370d7689769ce257966d6d18d6a30aae9a67c804032bd13b6b70"}, @INET_DIAG_REQ_BYTECODE={0xa4, 0x1, "a335384ef63cd18e08802f670306ae35171ff05c157c0d205d514ac2b81bc7c7be8e09d1240ea257e11f5de80a9402448a4b0075f293add3eaaf227461d247e16614bf31dd382367a2065d3c5874ae7ab7b24b4b330601c44fa9d48b1a9c1f30b32aeede75f2fcbad15770cbba37cf766e82f2d040fa5d7a40981131572fda52eaf802631ca9642dc2767ac2c443e31b47bc5e75efd0331e0e09cdb2a973848e"}, @INET_DIAG_REQ_BYTECODE={0x11, 0x1, "3f79a8850abeb33af3872d68fb"}, @INET_DIAG_REQ_BYTECODE={0xc9, 0x1, "0a3b1691be18151d024a7ddd99aeb575090d046d21c9a69d9c057d0c26ac4682b2a5d68262d37ff7b3ba5955532bd2daa410b3aa1814fc51657c8b53753b13e9c0297f9fc1e35493681723de57ee973eaddb15e5464eae820fbed1838ff2b82817e1f4a834db269faf711b60004d25d090f33d802d1a9e7f59abb42774ef6c556ceb7271d110e19df12f53af4ce578f530aad8189b317f160db8c27a9cff4d7f6d88b66fd704e1283bdbf6980dcc46068076be76f8e99b25de2935d8445bf2684698e05f83"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "180c36558310025129ba3334f166d6243d8fdaaa941f3eb856156f29caa9c472e08d3ce5879634d2b49f63b597251974348c779e34a840cef919a62aea199304e93d19775cace890392633b07f3dabc54b7c1f6c9b3713af"}, @INET_DIAG_REQ_BYTECODE={0x99, 0x1, "1852f5af72cb6d189828ac48cf52df4167a66479a0422b1617b56d4f5a3ff5052354cd20777cb2669cb2a8be045029e02a8b96dfcdb707538d518a62349ab08b61631ffee997c3201829ffc335c352bd8ae50734d3d581afdc33bab21f52abf5e3215009cb85d9c285c1167c80ab4966f5327f818851e94ace9f4ef43bd4b44e5bafff4b2a07cdaed48cbc1e0c1c011897f073a62d"}, @INET_DIAG_REQ_BYTECODE={0xde, 0x1, "3ec0a7292faf4d437b9c3d12c62fa37562c7d171019bc2ecc6df2105a5846424719c9948b097b45c61f67cb0f25c962c049026dc16f5f779e2518c8e5c224e6fd4cf16df86038e66314748f6a473fb05c98f14addde9d4fe47b85a106dde40bf14791ea981a1c76fb0a9e2e215f9d7f395113e21900a072229ce80d53acb419b30d678406df073b4a3f348c835d4caf061d788a8f106fc9c993e3c87ed7d2e71c1d32152745e0725459543c11457fb725409d136b5096d8acc456b4969f79b8cd3432d770d16df383206ae799162864bcfae70b7288037978b1c"}]}, 0x5d0}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$TIOCOUTQ(r6, 0x5411, &(0x7f0000000000)) [ 375.938833][ T2512] usb 2-1: new high-speed USB device number 41 using dummy_hcd 03:30:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c00000818000100000000000000000300000000000000856fec5aa767159a0c8ad70a33bfb637e65a734073be4ce92acf758a7c3f94a602f07d5cac13c317ef6f0a6c9fad6abb7b67229ca4c57f2a1225f43aeaa8f36c3c3d0c9eddbfd9020f9bbca2412cf9e70592d8d098596ab6f37f8778d9fd0db2724dcab5993ce17ec28a3e4259b570cde248571ee710d0f16e6072e82ca7032a33629d44f13a48ce770e6961a357db6c13b1c489f8597aed2c6de4"], 0x1c}}, 0x0) 03:30:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0xfd, 0x80, 0x0, 0x9, 0x8920c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x101}, 0x8803, 0x80000, 0xfffffffd, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x8) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xcc) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) [ 376.147292][T16369] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 376.319113][ T2512] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 376.335644][ T3796] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 376.388253][ T2512] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 376.412994][ T2512] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 376.438150][ T2512] usb 2-1: config 0 descriptor?? [ 376.493646][ T2512] usbhid 2-1:0.0: can't add hid device: -22 [ 376.503727][ T2512] usbhid: probe of 2-1:0.0 failed with error -22 [ 376.693767][ T45] usb 2-1: USB disconnect, device number 41 [ 376.738896][ T310] tipc: TX() has been purged, node left! [ 376.788877][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 376.788896][ T3796] usb 1-1: can't read configurations, error -61 [ 376.931248][ T310] tipc: TX() has been purged, node left! [ 376.948843][ T3796] usb 1-1: new high-speed USB device number 13 using dummy_hcd 03:30:33 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x600, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x50000}, 0x1c) 03:30:33 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:33 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 377.378935][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 377.386601][ T3796] usb 1-1: can't read configurations, error -61 [ 377.402600][ T3796] usb usb1-port1: attempt power cycle 03:30:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x400300}, 0x1c) [ 377.586315][T16416] IPVS: ftp: loaded support on port[0] = 21 [ 377.598173][T16415] IPVS: ftp: loaded support on port[0] = 21 03:30:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x700, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 377.738952][ T17] usb 2-1: new high-speed USB device number 42 using dummy_hcd 03:30:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x900, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x1000000}, 0x1c) [ 378.149275][ T3796] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 378.159424][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 378.175067][ T17] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 378.189991][ T17] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 378.200954][ T17] usb 2-1: config 0 descriptor?? [ 378.240277][ T17] usbhid 2-1:0.0: can't add hid device: -22 [ 378.246732][ T17] usbhid: probe of 2-1:0.0 failed with error -22 [ 378.418992][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 378.426645][ T3796] usb 1-1: can't read configurations, error -61 [ 378.447846][ T17] usb 2-1: USB disconnect, device number 42 [ 378.588935][ T3796] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 378.849145][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61 [ 378.856845][ T3796] usb 1-1: can't read configurations, error -61 [ 378.884357][ T3796] usb usb1-port1: unable to enumerate USB device 03:30:35 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e24, @private=0xa010102}], 0x10) sendto$inet6(r0, &(0x7f0000000000)="0f", 0x1, 0x20008041, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 03:30:35 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6c6f776572646977bea0723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530d13cb893cdae0984389636f4bfa8a6d28ac3a7d90593566a67239899c095f01d339ba50fcbf79069e43b23facec3c08ca23d792898e7f06c1f58a8fe77fb19c5dbbe32f930762dc338952e7eb07bfa153c5207efd49f5e5d2e14ce806ff91683153572a672d4118b82a2aba7eab0819c0f564bf21e6ba8c9d0be"]) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, 0x0, 0x0) chdir(&(0x7f00000002c0)='./bus\x00') r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x1f7) truncate(&(0x7f0000000000)='./bus\x00', 0x9) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x20}, 0x16, 0x2) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d06) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) readlinkat(r2, &(0x7f0000000200)='./bus\x00', 0xfffffffffffffffe, 0x0) 03:30:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2000000}, 0x1c) [ 379.120074][T16509] overlayfs: unrecognized mount option "lowerdiw¾ r=./bus" or missing value 03:30:35 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xa00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x3000000}, 0x1c) [ 379.538985][ T9940] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 379.895877][T16509] overlayfs: unrecognized mount option "lowerdiw¾ r=./bus" or missing value [ 379.904778][ T9940] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 379.928584][ T9940] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 379.947051][ T9940] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 379.985476][ T9940] usb 2-1: config 0 descriptor?? [ 380.049889][ T9940] usbhid 2-1:0.0: can't add hid device: -22 [ 380.055933][ T9940] usbhid: probe of 2-1:0.0 failed with error -22 [ 380.251629][ T9940] usb 2-1: USB disconnect, device number 43 [ 380.358863][ T310] tipc: TX() has been purged, node left! 03:30:36 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xb00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x4000000}, 0x1c) 03:30:36 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0x100000edc3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000480)={0x3, 0x1}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$packet(0x11, 0x3, 0x300) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PPPIOCSPASS(r8, 0x40107447, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x109, 0x0, 0x0, 0x42}, {0x3, 0x1, 0x5, 0x4}, {0x5, 0xfd, 0x4, 0xfffffffc}, {0x5, 0xb, 0x9, 0x105}, {0x404, 0x2, 0x0, 0x1}, {0x5, 0x1, 0x81, 0x17}, {0x6, 0x6, 0x81, 0x14000}, {0x0, 0xff, 0x3, 0x1000}]}) 03:30:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) splice(r3, 0x0, r4, 0x0, 0x1420000a7a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1c, 0xe, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYRES16=r4], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x4, 0x4}, 0x10}, 0x2b) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 03:30:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xc00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x5000000}, 0x1c) 03:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x6000000}, 0x1c) 03:30:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xd00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 380.793151][T16552] IPVS: ftp: loaded support on port[0] = 21 03:30:37 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x7000000}, 0x1c) 03:30:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xe00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:37 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x8000000}, 0x1c) 03:30:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 381.379092][ T9942] usb 2-1: new high-speed USB device number 44 using dummy_hcd 03:30:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000002c0)={0x1, 'veth0_vlan\x00', {}, 0x6}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x20000000fb], 0x100000, 0x200400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c, 0x80800) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000300)="58044ecc5da4545696d47857c9644e79", 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000280)=0x5, 0x4) 03:30:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000051c0)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)="01ea", 0x2}], 0x1, 0x0, 0x30}}], 0x1, 0x0) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x2000, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4009}]) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, &(0x7f0000000000)) 03:30:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x1100, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x9000000}, 0x1c) [ 381.717031][T16625] IPVS: ftp: loaded support on port[0] = 21 03:30:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x1200, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 381.809119][ T9942] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 03:30:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xa000000}, 0x1c) [ 381.856187][ T9942] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 381.933452][ T9942] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 381.978698][ T9942] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 382.031302][ T9942] usb 2-1: config 0 descriptor?? [ 382.401962][ T9942] usbhid 2-1:0.0: can't add hid device: -71 [ 382.408027][ T9942] usbhid: probe of 2-1:0.0 failed with error -71 [ 382.436990][ T9942] usb 2-1: USB disconnect, device number 44 03:30:39 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:39 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x14032, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, &(0x7f00000000c0)) 03:30:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf000000}, 0x1c) 03:30:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x2500, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:39 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:39 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 383.121997][T16705] IPVS: ftp: loaded support on port[0] = 21 [ 383.135172][T16706] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x12903da4}, 0x1c) 03:30:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x3901, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 383.379205][ T27] audit: type=1804 audit(1593747039.881:50): pid=16722 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/175/file0/bus" dev="loop0" ino=43 res=1 [ 383.394272][ T45] usb 2-1: new high-speed USB device number 45 using dummy_hcd [ 383.416635][T16704] IPVS: ftp: loaded support on port[0] = 21 03:30:40 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 383.508251][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 383.573490][T16705] IPVS: ftp: loaded support on port[0] = 21 [ 383.717897][ T27] audit: type=1804 audit(1593747040.221:51): pid=16747 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/176/bus" dev="sda1" ino=16371 res=1 03:30:40 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4788, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 383.879268][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 383.915778][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 383.953159][ T27] audit: type=1804 audit(1593747040.461:52): pid=16772 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/177/bus" dev="sda1" ino=16367 res=1 [ 383.954576][ T45] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 384.011230][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 384.029392][ T45] usb 2-1: config 0 descriptor?? [ 384.067425][ T310] tipc: TX() has been purged, node left! [ 384.090192][ T310] tipc: TX() has been purged, node left! [ 384.370255][ T45] usbhid 2-1:0.0: can't add hid device: -71 [ 384.376421][ T45] usbhid: probe of 2-1:0.0 failed with error -71 [ 384.398254][ T45] usb 2-1: USB disconnect, device number 45 03:30:41 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) [ 385.288808][ T17] usb 2-1: new high-speed USB device number 46 using dummy_hcd [ 385.709156][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 385.728767][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 385.738542][ T17] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 385.768817][ T17] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 385.793078][ T17] usb 2-1: config 0 descriptor?? 03:30:42 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:42 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4888, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x18020000}, 0x1c) 03:30:42 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 386.008176][T16841] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 386.138839][ T17] usbhid 2-1:0.0: can't add hid device: -71 [ 386.145049][ T17] usbhid: probe of 2-1:0.0 failed with error -71 [ 386.188670][ T17] usb 2-1: USB disconnect, device number 46 03:30:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x5865, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 386.245351][ T27] audit: type=1804 audit(1593747042.751:53): pid=16854 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/178/file0/bus" dev="loop0" ino=45 res=1 03:30:42 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) [ 386.425977][T16842] IPVS: ftp: loaded support on port[0] = 21 [ 386.432738][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 386.532287][T16853] IPVS: ftp: loaded support on port[0] = 21 [ 386.746654][ T27] audit: type=1804 audit(1593747043.251:54): pid=16867 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/179/bus" dev="sda1" ino=16376 res=1 03:30:43 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0) syz_usb_disconnect(r0) 03:30:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6558, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:43 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) 03:30:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x20000000}, 0x1c) [ 387.013045][T16906] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.132211][ T27] audit: type=1804 audit(1593747043.641:55): pid=16906 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/180/file0/bus" dev="loop0" ino=46 res=1 03:30:43 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 387.179458][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.228904][ T9942] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 387.414861][T16941] IPVS: ftp: loaded support on port[0] = 21 [ 387.480087][ T310] tipc: TX() has been purged, node left! [ 387.515865][ T310] tipc: TX() has been purged, node left! [ 387.570777][ T310] tipc: TX() has been purged, node left! [ 387.603866][ T9942] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 387.615415][ T9942] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 387.635149][ T9942] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 387.651209][ T9942] usb 2-1: config 0 descriptor?? [ 387.999978][ T9942] usbhid 2-1:0.0: can't add hid device: -71 [ 388.008317][ T9942] usbhid: probe of 2-1:0.0 failed with error -71 [ 388.038971][ T9942] usb 2-1: USB disconnect, device number 47 03:30:45 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8100, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) 03:30:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2d502a37}, 0x1c) 03:30:45 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:45 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0) syz_usb_disconnect(0xffffffffffffffff) [ 389.334573][T17010] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:45 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8847, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 389.439925][ T27] audit: type=1804 audit(1593747045.951:56): pid=17010 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/181/file0/bus" dev="loop0" ino=47 res=1 03:30:46 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:46 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 389.557254][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 389.598943][ T45] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 389.606001][T17006] IPVS: ftp: loaded support on port[0] = 21 03:30:46 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8848, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 389.726116][ T27] audit: type=1804 audit(1593747046.231:57): pid=17026 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/182/bus" dev="sda1" ino=16370 res=1 03:30:46 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:46 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:46 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 390.004777][ T27] audit: type=1804 audit(1593747046.511:58): pid=17041 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/183/bus" dev="sda1" ino=16372 res=1 [ 390.028870][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 390.084107][ T45] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 03:30:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x372a502d}, 0x1c) [ 390.126476][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 390.150670][ T45] usb 2-1: config 0 descriptor?? 03:30:46 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 390.515402][T17078] IPVS: ftp: loaded support on port[0] = 21 [ 390.679116][ T45] usbhid 2-1:0.0: can't add hid device: -71 [ 390.687540][ T45] usbhid: probe of 2-1:0.0 failed with error -71 [ 390.707583][ T45] usb 2-1: USB disconnect, device number 48 03:30:47 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0) syz_usb_disconnect(0xffffffffffffffff) 03:30:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfeff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:47 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:47 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 391.068873][ T310] tipc: TX() has been purged, node left! [ 391.144940][T17120] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x40000000}, 0x1c) [ 391.179413][ T27] audit: type=1804 audit(1593747047.691:59): pid=17120 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/184/file0/bus" dev="loop0" ino=48 res=1 03:30:47 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 391.249206][ T310] tipc: TX() has been purged, node left! 03:30:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xff0f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:47 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 391.408887][ T310] tipc: TX() has been purged, node left! [ 391.435980][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 391.460031][ T45] usb 2-1: new high-speed USB device number 49 using dummy_hcd 03:30:48 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 391.512902][T17123] IPVS: ftp: loaded support on port[0] = 21 03:30:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfffe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 391.582637][T17140] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 391.627953][ T27] audit: type=1804 audit(1593747048.131:60): pid=17140 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/185/file0/bus" dev="loop0" ino=49 res=1 03:30:48 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 391.849193][ T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 391.862289][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 391.891303][ T45] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 391.912258][ T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 391.955336][ T45] usb 2-1: config 0 descriptor?? [ 392.498967][ T45] usbhid 2-1:0.0: can't add hid device: -71 [ 392.505144][ T45] usbhid: probe of 2-1:0.0 failed with error -71 [ 392.527593][ T45] usb 2-1: USB disconnect, device number 49 03:30:49 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0) syz_usb_disconnect(0xffffffffffffffff) 03:30:49 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x34000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:49 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x41020000}, 0x1c) 03:30:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 393.004373][T17204] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x400300, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 393.211844][ T27] audit: type=1804 audit(1593747049.721:61): pid=17204 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/186/file0/bus" dev="loop0" ino=50 res=1 [ 393.279300][ T2512] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 393.318151][T17202] IPVS: ftp: loaded support on port[0] = 21 03:30:49 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x1000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:50 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 393.669605][ T2512] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 393.702758][ T2512] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40 [ 393.754920][ T2512] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 393.799926][ T2512] usb 2-1: config 0 descriptor?? [ 393.867611][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 394.348996][ T2512] usbhid 2-1:0.0: can't add hid device: -71 [ 394.355327][ T2512] usbhid: probe of 2-1:0.0 failed with error -71 [ 394.375041][ T2512] usb 2-1: USB disconnect, device number 50 03:30:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x54000000}, 0x1c) 03:30:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x2000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:51 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:51 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:51 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:51 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 394.748874][ T310] tipc: TX() has been purged, node left! 03:30:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) [ 394.830854][T17283] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.918569][ T27] audit: type=1804 audit(1593747051.421:62): pid=17283 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/187/file0/bus" dev="loop0" ino=51 res=1 03:30:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) [ 394.960308][ T310] tipc: TX() has been purged, node left! [ 394.995934][T17283] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625) [ 395.023340][ T27] audit: type=1804 audit(1593747051.531:63): pid=17297 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/179/bus" dev="sda1" ino=16066 res=1 03:30:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x3000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 395.074454][T17288] IPVS: ftp: loaded support on port[0] = 21 [ 395.100363][T17283] FAT-fs (loop0): Filesystem has been set read-only 03:30:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) [ 395.145414][T17283] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 625) 03:30:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 395.259074][T17283] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 625) [ 395.415065][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x58000000}, 0x1c) 03:30:52 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 395.908070][T17343] IPVS: ftp: loaded support on port[0] = 21 03:30:54 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:54 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x5000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:54 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x8dffffff}, 0x1c) 03:30:54 executing program 1: ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 397.778900][ T310] tipc: TX() has been purged, node left! [ 397.795114][T17407] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 397.851773][ T27] audit: type=1804 audit(1593747054.361:64): pid=17407 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/188/file0/bus" dev="loop0" ino=52 res=1 03:30:54 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:54 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 398.004534][T17407] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625) 03:30:54 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:54 executing program 1: ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 398.046944][T17403] IPVS: ftp: loaded support on port[0] = 21 [ 398.063346][T17407] FAT-fs (loop0): Filesystem has been set read-only 03:30:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x7000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 398.110924][T17407] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 398.186829][T17407] FAT-fs (loop0): error, clusters badly computed (1 != 94) [ 398.232085][T17407] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 625) 03:30:54 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:54 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:54 executing program 1: ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 398.330382][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 398.484843][T17440] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 398.556207][ T27] audit: type=1804 audit(1593747055.061:65): pid=17440 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/189/file0/bus" dev="loop0" ino=53 res=1 03:30:55 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:55 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:55 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x91ffffff}, 0x1c) 03:30:55 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 398.833231][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 03:30:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:55 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x9000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:55 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:55 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 399.071982][T17476] IPVS: ftp: loaded support on port[0] = 21 [ 399.096199][T17488] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xa000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 399.264690][ T27] audit: type=1804 audit(1593747055.771:66): pid=17488 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/190/file0/bus" dev="loop0" ino=54 res=1 [ 399.756811][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 03:30:56 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:56 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xb000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xa43d9012}, 0x1c) 03:30:56 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:56 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 399.968078][T17539] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 399.984778][T17541] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xc000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 400.103511][ T27] audit: type=1804 audit(1593747056.611:67): pid=17541 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir016283250/syzkaller.wuGozi/172/file0/bus" dev="loop2" ino=56 res=1 03:30:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 400.273639][ T27] audit: type=1804 audit(1593747056.611:68): pid=17539 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/191/file0/bus" dev="loop0" ino=55 res=1 03:30:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xd000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:57 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 400.595778][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 400.642084][ T289] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 400.754046][T17569] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xb8040000}, 0x1c) 03:30:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xe000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 400.846168][ T27] audit: type=1804 audit(1593747057.351:69): pid=17577 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/192/file0/bus" dev="loop0" ino=57 res=1 03:30:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 400.945646][T17577] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625) 03:30:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:57 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 401.018060][T17577] FAT-fs (loop0): Filesystem has been set read-only [ 401.049418][T17577] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF 03:30:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 401.094884][T17577] FAT-fs (loop0): error, clusters badly computed (1 != 108) [ 401.108914][T17577] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 625) 03:30:57 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 401.191418][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 401.368108][T17608] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 401.421760][ T27] audit: type=1804 audit(1593747057.931:70): pid=17608 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/193/file0/bus" dev="loop0" ino=58 res=1 [ 401.669891][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 03:30:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xc4ff0000}, 0x1c) 03:30:58 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:58 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:30:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:30:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x10000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:30:58 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb) 03:30:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:30:58 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:58 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 401.896929][T17626] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:30:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:30:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x11000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 402.139903][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 402.628872][ T310] tipc: TX() has been purged, node left! 03:30:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xc4ffffff}, 0x1c) 03:30:59 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb) 03:30:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:30:59 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:30:59 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:30:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x12000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 402.788876][ T310] tipc: TX() has been purged, node left! 03:30:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:30:59 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 402.841913][T17662] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:59 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb) 03:30:59 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 402.924516][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:30:59 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 402.969274][ T27] audit: type=1804 audit(1593747059.471:71): pid=17667 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/198/bus" dev="sda1" ino=16371 res=1 03:30:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x25000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 403.094249][T17678] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 403.171454][T17683] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 403.186297][ T27] audit: type=1804 audit(1593747059.691:72): pid=17678 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972708442/syzkaller.HqV8uk/211/file0/bus" dev="loop5" ino=61 res=1 [ 403.286198][ T27] audit: type=1804 audit(1593747059.791:73): pid=17681 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/199/bus" dev="sda1" ino=16382 res=1 [ 403.329471][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 403.539241][T11021] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 03:31:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe02e0000}, 0x1c) 03:31:00 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x39010000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:00 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) 03:31:00 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:00 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:00 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 403.820258][T17708] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 403.849059][T17710] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x40000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 403.939517][ T27] audit: type=1804 audit(1593747060.451:74): pid=17709 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/200/bus" dev="sda1" ino=16371 res=1 03:31:00 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) 03:31:00 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:00 executing program 5: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 404.076331][ T27] audit: type=1804 audit(1593747060.491:75): pid=17720 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/197/file0/bus" dev="sda1" ino=16368 res=1 03:31:00 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 404.167568][ T27] audit: type=1804 audit(1593747060.501:76): pid=17710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/197/file0/bus" dev="sda1" ino=16368 res=1 [ 404.234428][T17731] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.477500][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.616171][T17737] IPVS: ftp: loaded support on port[0] = 21 03:31:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe0ffffff}, 0x1c) 03:31:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x60000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:01 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:01 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:01 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) 03:31:01 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:01 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x65580000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:01 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:01 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:01 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) 03:31:01 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 405.272995][T17793] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.326588][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 405.326598][ T27] audit: type=1804 audit(1593747061.831:81): pid=17793 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/200/file0/bus" dev="loop0" ino=65 res=1 [ 405.416855][T17793] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625) [ 405.426954][T17793] FAT-fs (loop0): Filesystem has been set read-only [ 405.440432][T17793] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 625) [ 405.450449][T17802] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.499402][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.566674][ T27] audit: type=1804 audit(1593747062.071:82): pid=17802 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972708442/syzkaller.HqV8uk/214/file0/bus" dev="loop5" ino=66 res=1 [ 405.660900][ T7] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe8030000}, 0x1c) 03:31:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x81000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:02 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:02 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:02 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:02 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:02 executing program 1: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:02 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 405.977628][T17823] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.979435][T17821] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x88470000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 406.106182][ T27] audit: type=1804 audit(1593747062.611:83): pid=17823 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972708442/syzkaller.HqV8uk/215/file0/bus" dev="loop5" ino=67 res=1 03:31:02 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 406.276521][ T27] audit: type=1804 audit(1593747062.671:84): pid=17821 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/201/file0/bus" dev="sda1" ino=16382 res=1 03:31:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x88480000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:02 executing program 2: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 406.530997][T17835] IPVS: ftp: loaded support on port[0] = 21 [ 406.703707][T11013] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 03:31:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf4010000}, 0x1c) 03:31:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x88a8ffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:03 executing program 2: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:03 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:03 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 406.973159][T17865] FAULT_INJECTION: forcing a failure. [ 406.973159][T17865] name failslab, interval 1, probability 0, space 0, times 0 [ 407.043385][T17865] CPU: 0 PID: 17865 Comm: syz-executor.5 Not tainted 5.8.0-rc3-syzkaller #0 [ 407.052084][T17865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.062134][T17865] Call Trace: [ 407.065427][T17865] dump_stack+0x1f0/0x31e [ 407.069770][T17865] should_fail+0x38a/0x4e0 [ 407.074194][T17865] ? tomoyo_realpath_from_path+0xd8/0x630 [ 407.079907][T17865] should_failslab+0x5/0x20 [ 407.084406][T17865] __kmalloc+0x74/0x330 [ 407.088565][T17865] ? tomoyo_realpath_from_path+0xcb/0x630 [ 407.094284][T17865] tomoyo_realpath_from_path+0xd8/0x630 [ 407.099837][T17865] tomoyo_path_number_perm+0x18f/0x690 [ 407.105330][T17865] security_file_ioctl+0x55/0xb0 [ 407.110271][T17865] __se_sys_ioctl+0x48/0x160 [ 407.114887][T17865] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 407.120960][T17865] do_syscall_64+0x73/0xe0 [ 407.125380][T17865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 407.131272][T17865] RIP: 0033:0x45cb29 [ 407.135154][T17865] Code: Bad RIP value. 03:31:03 executing program 2: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 407.139212][T17865] RSP: 002b:00007f402cb0cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 407.147617][T17865] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 407.155605][T17865] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003 [ 407.163594][T17865] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 407.171558][T17865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 407.179523][T17865] R13: 0000000000000233 R14: 00000000004c48be R15: 00007f402cb0d6d4 [ 407.190828][T17865] ERROR: Out of memory at tomoyo_realpath_from_path. [ 407.226899][ T27] audit: type=1804 audit(1593747063.731:85): pid=17868 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/202/bus" dev="sda1" ino=16382 res=1 03:31:03 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:03 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:03 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) 03:31:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x9effffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:03 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 407.420497][T17898] FAULT_INJECTION: forcing a failure. [ 407.420497][T17898] name failslab, interval 1, probability 0, space 0, times 0 [ 407.449713][T17899] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.509414][ T27] audit: type=1804 audit(1593747064.021:86): pid=17899 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/203/file0/bus" dev="loop0" ino=68 res=1 [ 407.562564][T17898] CPU: 1 PID: 17898 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0 [ 407.571256][T17898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.581304][T17898] Call Trace: [ 407.584595][T17898] dump_stack+0x1f0/0x31e [ 407.588928][T17898] should_fail+0x38a/0x4e0 [ 407.593346][T17898] ? tomoyo_realpath_from_path+0xd8/0x630 [ 407.599058][T17898] should_failslab+0x5/0x20 [ 407.603567][T17898] __kmalloc+0x74/0x330 [ 407.607724][T17898] ? tomoyo_realpath_from_path+0xcb/0x630 [ 407.613447][T17898] tomoyo_realpath_from_path+0xd8/0x630 [ 407.619005][T17898] tomoyo_path_number_perm+0x18f/0x690 [ 407.624500][T17898] security_file_ioctl+0x55/0xb0 [ 407.629441][T17898] __se_sys_ioctl+0x48/0x160 [ 407.634037][T17898] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 407.640112][T17898] do_syscall_64+0x73/0xe0 [ 407.644527][T17898] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 407.650412][T17898] RIP: 0033:0x45cb29 [ 407.654296][T17898] Code: Bad RIP value. 03:31:04 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) [ 407.658358][T17898] RSP: 002b:00007fdeebc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 407.666763][T17898] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 407.674729][T17898] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003 [ 407.682700][T17898] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 407.690668][T17898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 407.698638][T17898] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fdeebc626d4 [ 407.738623][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.746809][T17898] ERROR: Out of memory at tomoyo_realpath_from_path. [ 407.840839][T17914] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf5ffffff}, 0x1c) 03:31:04 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:04 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xefffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 407.907692][ T27] audit: type=1804 audit(1593747064.411:87): pid=17914 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/204/file0/bus" dev="loop0" ino=69 res=1 03:31:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x2, &(0x7f0000000140)) [ 407.992537][T17923] FAULT_INJECTION: forcing a failure. [ 407.992537][T17923] name failslab, interval 1, probability 0, space 0, times 0 [ 408.022669][T17923] CPU: 0 PID: 17923 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0 [ 408.031348][T17923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.041396][T17923] Call Trace: [ 408.044692][T17923] dump_stack+0x1f0/0x31e [ 408.049026][T17923] should_fail+0x38a/0x4e0 [ 408.053453][T17923] ? tomoyo_encode2+0x25a/0x560 [ 408.058304][T17923] should_failslab+0x5/0x20 [ 408.062805][T17923] __kmalloc+0x74/0x330 [ 408.066965][T17923] tomoyo_encode2+0x25a/0x560 [ 408.071648][T17923] tomoyo_realpath_from_path+0x5d6/0x630 [ 408.077290][T17923] tomoyo_path_number_perm+0x18f/0x690 [ 408.082784][T17923] security_file_ioctl+0x55/0xb0 [ 408.087725][T17923] __se_sys_ioctl+0x48/0x160 [ 408.092318][T17923] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 408.098384][T17923] do_syscall_64+0x73/0xe0 [ 408.102803][T17923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 408.108692][T17923] RIP: 0033:0x45cb29 [ 408.112575][T17923] Code: Bad RIP value. [ 408.116645][T17923] RSP: 002b:00007fdeebc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.125057][T17923] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 408.133027][T17923] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003 03:31:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x10, &(0x7f0000000140)) 03:31:04 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) lseek(r1, 0x4200, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) [ 408.140996][T17923] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 408.148964][T17923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 408.156936][T17923] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fdeebc626d4 [ 408.195374][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:04 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x301, &(0x7f0000000140)) 03:31:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf0ffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:04 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 408.306819][ T27] audit: type=1804 audit(1593747064.811:88): pid=17940 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/205/bus" dev="sda1" ino=15753 res=1 [ 408.376712][T17923] ERROR: Out of memory at tomoyo_realpath_from_path. [ 408.378963][ T310] tipc: TX() has been purged, node left! [ 408.457341][T17949] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 408.518932][ T27] audit: type=1804 audit(1593747065.021:89): pid=17949 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/206/file0/bus" dev="loop0" ino=70 res=1 [ 408.560427][ T310] tipc: TX() has been purged, node left! [ 408.583894][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfc000000}, 0x1c) 03:31:05 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125d, &(0x7f0000000140)) 03:31:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfeff0000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:05 executing program 1 (fault-call:1 fault-nth:2): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:05 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 408.968026][T17968] FAULT_INJECTION: forcing a failure. [ 408.968026][T17968] name failslab, interval 1, probability 0, space 0, times 0 [ 409.008800][T17968] CPU: 0 PID: 17968 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0 [ 409.017496][T17968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.027545][T17968] Call Trace: [ 409.030836][T17968] dump_stack+0x1f0/0x31e [ 409.035167][T17968] should_fail+0x38a/0x4e0 [ 409.039589][T17968] ? tomoyo_encode2+0x25a/0x560 [ 409.044434][T17968] should_failslab+0x5/0x20 [ 409.048942][T17968] __kmalloc+0x74/0x330 [ 409.053126][T17968] tomoyo_encode2+0x25a/0x560 [ 409.057812][T17968] tomoyo_realpath_from_path+0x5d6/0x630 [ 409.063467][T17968] tomoyo_path_number_perm+0x18f/0x690 [ 409.068961][T17968] security_file_ioctl+0x55/0xb0 [ 409.073902][T17968] __se_sys_ioctl+0x48/0x160 [ 409.078525][T17968] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 409.084592][T17968] do_syscall_64+0x73/0xe0 [ 409.089013][T17968] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 409.094903][T17968] RIP: 0033:0x45cb29 [ 409.098783][T17968] Code: Bad RIP value. 03:31:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125e, &(0x7f0000000140)) 03:31:05 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 409.102838][T17968] RSP: 002b:00007fdeebc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 409.111242][T17968] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 409.119215][T17968] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003 [ 409.127205][T17968] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 409.135163][T17968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 409.143132][T17968] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fdeebc626d4 03:31:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125f, &(0x7f0000000140)) [ 409.167786][T17976] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1260, &(0x7f0000000140)) 03:31:05 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140)) [ 409.313217][ T27] audit: type=1804 audit(1593747065.821:90): pid=17976 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/207/file0/bus" dev="sda1" ino=16372 res=1 [ 409.441071][T17968] ERROR: Out of memory at tomoyo_realpath_from_path. 03:31:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfe800000}, 0x1c) 03:31:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xff0f0000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:06 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:06 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1262, &(0x7f0000000140)) 03:31:06 executing program 1 (fault-call:1 fault-nth:3): r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x2, &(0x7f0000000140)) [ 410.044144][T18014] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x10, &(0x7f0000000140)) 03:31:06 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1263, &(0x7f0000000140)) 03:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x301, &(0x7f0000000140)) [ 410.291463][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfe80ffff}, 0x1c) 03:31:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1264, &(0x7f0000000140)) 03:31:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffa888, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125d, &(0x7f0000000140)) 03:31:07 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb) 03:31:07 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:07 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1265, &(0x7f0000000140)) 03:31:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125e, &(0x7f0000000140)) 03:31:07 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 410.989774][T18051] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 411.115905][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 411.115915][ T27] audit: type=1804 audit(1593747067.621:92): pid=18051 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/209/file0/bus" dev="loop0" ino=72 res=1 03:31:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffff7f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1267, &(0x7f0000000140)) [ 411.282111][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfec0ffff}, 0x1c) 03:31:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125f, &(0x7f0000000140)) 03:31:08 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:08 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb) 03:31:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1268, &(0x7f0000000140)) 03:31:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffff9e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:08 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1260, &(0x7f0000000140)) 03:31:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1269, &(0x7f0000000140)) [ 411.983530][T18097] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140)) 03:31:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffffef, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1274, &(0x7f0000000140)) [ 412.090556][ T27] audit: type=1804 audit(1593747068.601:93): pid=18097 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/210/file0/bus" dev="loop0" ino=73 res=1 [ 412.191294][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff000000}, 0x1c) 03:31:09 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb) 03:31:09 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1262, &(0x7f0000000140)) 03:31:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfffffff0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1275, &(0x7f0000000140)) 03:31:09 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1276, &(0x7f0000000140)) 03:31:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1263, &(0x7f0000000140)) [ 412.967914][T18138] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1264, &(0x7f0000000140)) 03:31:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1277, &(0x7f0000000140)) [ 413.127633][ T27] audit: type=1804 audit(1593747069.621:94): pid=18138 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/211/file0/bus" dev="loop0" ino=74 res=1 [ 413.208820][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff0f0000}, 0x1c) 03:31:10 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1265, &(0x7f0000000140)) 03:31:10 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1278, &(0x7f0000000140)) 03:31:10 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 413.874092][T18177] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:10 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:10 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1279, &(0x7f0000000140)) 03:31:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1267, &(0x7f0000000140)) [ 413.920204][ T27] audit: type=1804 audit(1593747070.431:95): pid=18177 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/212/file0/bus" dev="loop0" ino=75 res=1 [ 413.948921][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 414.139324][T18197] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 414.188322][ T27] audit: type=1804 audit(1593747070.691:96): pid=18197 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/213/file0/bus" dev="loop0" ino=76 res=1 [ 414.212885][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffff0000}, 0x1c) 03:31:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127a, &(0x7f0000000140)) 03:31:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1268, &(0x7f0000000140)) 03:31:11 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:11 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1269, &(0x7f0000000140)) [ 414.817848][T18222] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1274, &(0x7f0000000140)) 03:31:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127b, &(0x7f0000000140)) 03:31:11 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1275, &(0x7f0000000140)) [ 414.922204][ T27] audit: type=1804 audit(1593747071.431:97): pid=18232 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/214/file0/bus" dev="loop0" ino=77 res=1 [ 415.030770][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffff80fe}, 0x1c) 03:31:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127c, &(0x7f0000000140)) 03:31:12 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:12 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1276, &(0x7f0000000140)) 03:31:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:12 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:31:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127e, &(0x7f0000000140)) 03:31:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1277, &(0x7f0000000140)) [ 415.786675][T18266] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127f, &(0x7f0000000140)) 03:31:12 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) [ 415.908427][ T27] audit: type=1804 audit(1593747072.411:98): pid=18266 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/215/file0/bus" dev="loop0" ino=78 res=1 [ 416.017167][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffc0fe}, 0x1c) 03:31:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x3b71, &(0x7f0000000140)) 03:31:13 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1278, &(0x7f0000000140)) 03:31:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:13 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:31:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c00, &(0x7f0000000140)) [ 416.701377][T18304] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:13 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:31:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1279, &(0x7f0000000140)) 03:31:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c01, &(0x7f0000000140)) 03:31:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127a, &(0x7f0000000140)) [ 416.815992][ T27] audit: type=1804 audit(1593747073.321:99): pid=18304 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/216/file0/bus" dev="loop0" ino=79 res=1 03:31:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 416.930601][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffff8d}, 0x1c) 03:31:14 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:31:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127b, &(0x7f0000000140)) 03:31:14 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x541b, &(0x7f0000000140)) 03:31:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:14 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:31:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5421, &(0x7f0000000140)) 03:31:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127c, &(0x7f0000000140)) 03:31:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5450, &(0x7f0000000140)) [ 417.705668][T18345] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5451, &(0x7f0000000140)) [ 417.842517][ T27] audit: type=1804 audit(1593747074.351:100): pid=18345 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/217/file0/bus" dev="loop0" ino=80 res=1 [ 417.946257][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffff91}, 0x1c) 03:31:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127e, &(0x7f0000000140)) 03:31:15 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:31:15 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5452, &(0x7f0000000140)) 03:31:15 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 03:31:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5460, &(0x7f0000000140)) [ 418.677459][T18387] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x6364, &(0x7f0000000140)) 03:31:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127f, &(0x7f0000000140)) 03:31:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 418.789482][ T27] audit: type=1804 audit(1593747075.291:101): pid=18387 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/218/file0/bus" dev="loop0" ino=81 res=1 03:31:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140)) [ 418.890206][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffc4}, 0x1c) 03:31:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4143, &(0x7f0000000140)) 03:31:16 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8912, &(0x7f0000000140)) 03:31:16 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c00, &(0x7f0000000140)) 03:31:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8933, &(0x7f0000000140)) 03:31:16 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 419.659910][T18431] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 419.797436][ T27] audit: type=1804 audit(1593747076.301:102): pid=18431 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/219/file0/bus" dev="sda1" ino=16374 res=1 03:31:16 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:16 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 419.968547][T18455] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.022114][T18460] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.037896][ T27] audit: type=1804 audit(1593747076.541:103): pid=18455 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir016283250/syzkaller.wuGozi/226/file0/bus" dev="loop2" ino=82 res=1 [ 420.075309][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.082437][ T27] audit: type=1804 audit(1593747076.541:104): pid=18460 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/220/file0/bus" dev="loop0" ino=83 res=1 [ 420.124753][ T310] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffe0}, 0x1c) 03:31:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c01, &(0x7f0000000140)) 03:31:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x400454ca, &(0x7f0000000140)) 03:31:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:17 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) 03:31:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140)) 03:31:17 executing program 2 (fault-call:5 fault-nth:0): keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x541b, &(0x7f0000000140)) 03:31:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40049409, &(0x7f0000000140)) [ 420.591981][T18482] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 420.735900][ T27] audit: type=1804 audit(1593747077.241:105): pid=18493 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/221/bus" dev="sda1" ino=16367 res=1 [ 420.755588][T18491] FAULT_INJECTION: forcing a failure. [ 420.755588][T18491] name failslab, interval 1, probability 0, space 0, times 0 03:31:17 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) [ 420.865302][T18491] CPU: 0 PID: 18491 Comm: syz-executor.2 Not tainted 5.8.0-rc3-syzkaller #0 [ 420.874018][T18491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.884092][T18491] Call Trace: [ 420.887398][T18491] dump_stack+0x1f0/0x31e [ 420.891754][T18491] should_fail+0x38a/0x4e0 [ 420.896197][T18491] ? tomoyo_realpath_from_path+0xd8/0x630 [ 420.901930][T18491] should_failslab+0x5/0x20 [ 420.906450][T18491] __kmalloc+0x74/0x330 [ 420.910745][T18491] ? tomoyo_realpath_from_path+0xcb/0x630 [ 420.916485][T18491] tomoyo_realpath_from_path+0xd8/0x630 [ 420.922055][T18491] tomoyo_path_number_perm+0x18f/0x690 [ 420.927560][T18491] security_file_ioctl+0x55/0xb0 [ 420.932600][T18491] __se_sys_ioctl+0x48/0x160 [ 420.937295][T18491] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 420.943478][T18491] do_syscall_64+0x73/0xe0 [ 420.947911][T18491] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 420.953814][T18491] RIP: 0033:0x45cb29 [ 420.957871][T18491] Code: Bad RIP value. 03:31:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40081271, &(0x7f0000000140)) [ 420.961945][T18491] RSP: 002b:00007fab348f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 420.970369][T18491] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 420.978442][T18491] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000004 [ 420.986559][T18491] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 420.994541][T18491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 421.002525][T18491] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fab348fa6d4 [ 421.046027][T18491] ERROR: Out of memory at tomoyo_realpath_from_path. [ 421.046959][ T27] audit: type=1804 audit(1593747077.551:106): pid=18502 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/222/bus" dev="sda1" ino=16368 res=1 03:31:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfffffff5}, 0x1c) 03:31:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5421, &(0x7f0000000140)) 03:31:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:17 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) 03:31:17 executing program 2 (fault-call:5 fault-nth:1): keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101283, &(0x7f0000000140)) 03:31:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5450, &(0x7f0000000140)) [ 421.535106][T18528] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 421.551170][T18527] FAULT_INJECTION: forcing a failure. [ 421.551170][T18527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 421.564386][T18527] CPU: 0 PID: 18527 Comm: syz-executor.2 Not tainted 5.8.0-rc3-syzkaller #0 [ 421.573066][T18527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.583212][T18527] Call Trace: [ 421.586522][T18527] dump_stack+0x1f0/0x31e [ 421.590868][T18527] should_fail+0x38a/0x4e0 [ 421.595303][T18527] prepare_alloc_pages+0x28c/0x4a0 [ 421.600432][T18527] __alloc_pages_nodemask+0xbc/0x5e0 [ 421.605840][T18527] ? kvm_sched_clock_read+0x15/0x40 [ 421.611056][T18527] ? sched_clock+0x36/0x40 [ 421.615492][T18527] kmem_getpages+0x49/0x900 [ 421.620012][T18527] cache_grow_begin+0x7b/0x2e0 [ 421.624793][T18527] cache_alloc_refill+0x359/0x3f0 [ 421.629841][T18527] ? check_preemption_disabled+0x51/0x140 03:31:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101286, &(0x7f0000000140)) [ 421.635581][T18527] __kmalloc+0x30c/0x330 [ 421.639846][T18527] ? tomoyo_realpath_from_path+0xd8/0x630 [ 421.645584][T18527] tomoyo_realpath_from_path+0xd8/0x630 [ 421.651211][T18527] tomoyo_path_number_perm+0x18f/0x690 [ 421.656690][T18527] ? sched_clock_cpu+0x18/0x3b0 [ 421.661725][T18527] ? kvm_sched_clock_read+0x15/0x40 [ 421.666940][T18527] ? sched_clock+0x36/0x40 [ 421.671403][T18527] security_file_ioctl+0x55/0xb0 [ 421.676374][T18527] __se_sys_ioctl+0x48/0x160 [ 421.680985][T18527] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 421.687227][T18527] do_syscall_64+0x73/0xe0 [ 421.691664][T18527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 421.697592][T18527] RIP: 0033:0x45cb29 [ 421.701493][T18527] Code: Bad RIP value. [ 421.705570][T18527] RSP: 002b:00007fab348f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 421.713991][T18527] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 421.721972][T18527] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000004 03:31:18 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) [ 421.729952][T18527] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 421.738021][T18527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 421.745999][T18527] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fab348fa6d4 [ 421.757669][ T27] audit: type=1804 audit(1593747078.171:107): pid=18533 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/223/bus" dev="sda1" ino=16366 res=1 03:31:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5451, &(0x7f0000000140)) 03:31:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101287, &(0x7f0000000140)) [ 421.896360][ T27] audit: type=1804 audit(1593747078.401:108): pid=18540 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/224/bus" dev="sda1" ino=16356 res=1 03:31:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 03:31:18 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) 03:31:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101288, &(0x7f0000000140)) 03:31:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5452, &(0x7f0000000140)) 03:31:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:18 executing program 2 (fault-call:5 fault-nth:2): keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070c9, &(0x7f0000000140)) [ 422.477791][T18563] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 422.504283][T18567] FAULT_INJECTION: forcing a failure. [ 422.504283][T18567] name failslab, interval 1, probability 0, space 0, times 0 [ 422.617685][ T27] audit: type=1804 audit(1593747079.121:109): pid=18563 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/225/bus" dev="sda1" ino=16364 res=1 [ 422.654096][T18567] CPU: 1 PID: 18567 Comm: syz-executor.2 Not tainted 5.8.0-rc3-syzkaller #0 [ 422.662798][T18567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.672861][T18567] Call Trace: [ 422.676261][T18567] dump_stack+0x1f0/0x31e [ 422.680614][T18567] should_fail+0x38a/0x4e0 [ 422.685054][T18567] ? tomoyo_encode2+0x25a/0x560 [ 422.689921][T18567] should_failslab+0x5/0x20 [ 422.694438][T18567] __kmalloc+0x74/0x330 [ 422.698621][T18567] tomoyo_encode2+0x25a/0x560 [ 422.703320][T18567] tomoyo_realpath_from_path+0x5d6/0x630 [ 422.708985][T18567] tomoyo_path_number_perm+0x18f/0x690 03:31:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5460, &(0x7f0000000140)) 03:31:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2}, 0x1c) 03:31:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 422.714627][T18567] ? sched_clock_cpu+0x18/0x3b0 [ 422.719495][T18567] ? kvm_sched_clock_read+0x15/0x40 [ 422.724710][T18567] ? sched_clock+0x36/0x40 [ 422.729162][T18567] ? security_file_ioctl+0x60/0xb0 [ 422.734317][T18567] security_file_ioctl+0x55/0xb0 [ 422.735485][ T27] audit: type=1804 audit(1593747079.121:110): pid=18577 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/225/bus" dev="sda1" ino=16364 res=1 [ 422.739507][T18567] __se_sys_ioctl+0x48/0x160 03:31:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070ca, &(0x7f0000000140)) [ 422.739527][T18567] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 422.739540][T18567] do_syscall_64+0x73/0xe0 [ 422.739554][T18567] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 422.739566][T18567] RIP: 0033:0x45cb29 [ 422.739571][T18567] Code: Bad RIP value. [ 422.739578][T18567] RSP: 002b:00007fab348f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.739590][T18567] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29 [ 422.739598][T18567] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000004 03:31:19 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) [ 422.739605][T18567] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 422.739611][T18567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 422.739619][T18567] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fab348fa6d4 03:31:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070cd, &(0x7f0000000140)) 03:31:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5501, &(0x7f0000000140)) [ 422.916756][T18567] ERROR: Out of memory at tomoyo_realpath_from_path. [ 423.001508][T18596] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40186366, &(0x7f0000000140)) 03:31:19 executing program 2 (fault-call:5 fault-nth:3): keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 423.105983][ T27] audit: type=1804 audit(1593747079.611:111): pid=18596 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/226/bus" dev="sda1" ino=16384 res=1 03:31:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5509, &(0x7f0000000140)) [ 423.266545][T18609] FAT-fs (loop0): bogus number of FAT sectors 03:31:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870c8, &(0x7f0000000140)) [ 423.309946][T18609] FAT-fs (loop0): Can't find a valid FAT filesystem [ 423.362822][ T27] audit: type=1804 audit(1593747079.871:112): pid=18609 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/227/file0/bus" dev="sda1" ino=16366 res=1 [ 423.405668][ T27] audit: type=1804 audit(1593747079.881:113): pid=18620 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/227/file0/bus" dev="sda1" ino=16366 res=1 03:31:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c) 03:31:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:20 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:31:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x551f, &(0x7f0000000140)) 03:31:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870cb, &(0x7f0000000140)) 03:31:20 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x2, &(0x7f0000000140)) [ 423.790471][T18639] FAT-fs (loop0): bogus number of FAT sectors [ 423.804067][T18639] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870cc, &(0x7f0000000140)) 03:31:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x6364, &(0x7f0000000140)) 03:31:20 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x10, &(0x7f0000000140)) 03:31:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 423.936087][ T27] audit: type=1804 audit(1593747080.441:114): pid=18639 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/228/file0/bus" dev="sda1" ino=15756 res=1 [ 424.092247][T18663] FAT-fs (loop0): bogus number of FAT sectors [ 424.102073][T18663] FAT-fs (loop0): Can't find a valid FAT filesystem [ 424.221608][ T27] audit: type=1804 audit(1593747080.731:115): pid=18663 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/229/file0/bus" dev="sda1" ino=16367 res=1 03:31:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4}, 0x1c) 03:31:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x7003, &(0x7f0000000140)) 03:31:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4020940d, &(0x7f0000000140)) 03:31:21 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x301, &(0x7f0000000140)) 03:31:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:21 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4020ae46, &(0x7f0000000140)) 03:31:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x7004, &(0x7f0000000140)) [ 424.802715][T18687] FAT-fs (loop0): bogus number of FAT sectors 03:31:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:21 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125d, &(0x7f0000000140)) [ 424.846566][T18687] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40286608, &(0x7f0000000140)) 03:31:21 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 424.919481][ T27] audit: type=1804 audit(1593747081.431:116): pid=18687 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/230/file0/bus" dev="sda1" ino=16374 res=1 [ 425.024340][T18710] FAT-fs (loop0): bogus number of FAT sectors [ 425.036573][T18710] FAT-fs (loop0): Can't find a valid FAT filesystem [ 425.127993][ T27] audit: type=1804 audit(1593747081.631:117): pid=18710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/231/file0/bus" dev="sda1" ino=16370 res=1 03:31:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5}, 0x1c) 03:31:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8912, &(0x7f0000000140)) 03:31:22 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125e, &(0x7f0000000140)) 03:31:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x404c534a, &(0x7f0000000140)) 03:31:22 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80041284, &(0x7f0000000140)) 03:31:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8914, &(0x7f0000000140)) 03:31:22 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x125f, &(0x7f0000000140)) [ 425.746813][T18732] FAT-fs (loop0): bogus number of FAT sectors [ 425.766356][T18732] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80041285, &(0x7f0000000140)) 03:31:22 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 426.011642][T18755] FAT-fs (loop0): bogus number of FAT sectors [ 426.017881][T18755] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x6}, 0x1c) 03:31:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8933, &(0x7f0000000140)) 03:31:23 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1260, &(0x7f0000000140)) 03:31:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80081270, &(0x7f0000000140)) 03:31:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:23 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xae01, &(0x7f0000000140)) 03:31:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80081272, &(0x7f0000000140)) 03:31:23 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140)) [ 426.739544][T18778] FAT-fs (loop0): bogus number of FAT sectors [ 426.766295][T18778] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xae41, &(0x7f0000000140)) 03:31:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80086301, &(0x7f0000000140)) [ 426.900025][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 426.900035][ T27] audit: type=1804 audit(1593747083.411:121): pid=18788 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/234/file0/bus" dev="sda1" ino=16368 res=1 03:31:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x7}, 0x1c) 03:31:24 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1262, &(0x7f0000000140)) 03:31:24 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xae60, &(0x7f0000000140)) 03:31:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140)) 03:31:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:24 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1263, &(0x7f0000000140)) 03:31:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140)) [ 427.671931][T18822] FAT-fs (loop0): bogus number of FAT sectors [ 427.685968][T18822] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xae80, &(0x7f0000000140)) 03:31:24 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1264, &(0x7f0000000140)) 03:31:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc00c642e, &(0x7f0000000140)) 03:31:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 427.830112][ T27] audit: type=1804 audit(1593747084.341:122): pid=18839 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/235/file0/bus" dev="sda1" ino=16382 res=1 03:31:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8}, 0x1c) 03:31:25 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1265, &(0x7f0000000140)) 03:31:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0101282, &(0x7f0000000140)) 03:31:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xae9a, &(0x7f0000000140)) 03:31:25 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x400454ca, &(0x7f0000000140)) 03:31:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0184900, &(0x7f0000000140)) 03:31:25 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1267, &(0x7f0000000140)) 03:31:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0189436, &(0x7f0000000140)) 03:31:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x400454dc, &(0x7f0000000140)) [ 428.754209][ T27] audit: type=1804 audit(1593747085.261:123): pid=18864 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/236/file0/bus" dev="sda1" ino=16372 res=1 03:31:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x9}, 0x1c) 03:31:26 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1268, &(0x7f0000000140)) 03:31:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc020660b, &(0x7f0000000140)) 03:31:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4004550a, &(0x7f0000000140)) 03:31:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0406619, &(0x7f0000000140)) 03:31:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0481273, &(0x7f0000000140)) 03:31:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40045564, &(0x7f0000000140)) 03:31:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1269, &(0x7f0000000140)) [ 429.676450][ T27] audit: type=1804 audit(1593747086.181:124): pid=18908 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/237/file0/bus" dev="sda1" ino=16033 res=1 03:31:26 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 429.926741][ T27] audit: type=1804 audit(1593747086.431:125): pid=18937 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/238/file0/bus" dev="sda1" ino=15811 res=1 03:31:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa}, 0x1c) 03:31:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc10c5541, &(0x7f0000000140)) 03:31:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40049409, &(0x7f0000000140)) 03:31:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1274, &(0x7f0000000140)) 03:31:26 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc4c85513, &(0x7f0000000140)) 03:31:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2) 03:31:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40081271, &(0x7f0000000140)) 03:31:27 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1275, &(0x7f0000000140)) 03:31:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40085503, &(0x7f0000000140)) [ 430.648111][ T27] audit: type=1804 audit(1593747087.151:126): pid=18963 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/239/bus" dev="sda1" ino=16081 res=1 03:31:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf}, 0x1c) 03:31:27 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3) 03:31:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40086602, &(0x7f0000000140)) 03:31:27 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1276, &(0x7f0000000140)) 03:31:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4008ae89, &(0x7f0000000140)) 03:31:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4) 03:31:28 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1277, &(0x7f0000000140)) [ 431.532694][ T27] audit: type=1804 audit(1593747088.041:127): pid=19004 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/240/bus" dev="sda1" ino=15825 res=1 03:31:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4008ae90, &(0x7f0000000140)) 03:31:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:28 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 431.763560][ T27] audit: type=1804 audit(1593747088.271:128): pid=19029 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/241/bus" dev="sda1" ino=15758 res=1 03:31:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x54}, 0x1c) 03:31:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5) 03:31:28 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1278, &(0x7f0000000140)) 03:31:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40095505, &(0x7f0000000140)) 03:31:28 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6) 03:31:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101283, &(0x7f0000000140)) [ 432.444820][T19050] FAT-fs (loop0): bread failed, FSINFO block (sector = 1) 03:31:29 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x1279, &(0x7f0000000140)) 03:31:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101286, &(0x7f0000000140)) 03:31:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7) [ 432.589852][ T27] audit: type=1804 audit(1593747089.101:129): pid=19050 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/242/file0/bus" dev="sda1" ino=15890 res=1 03:31:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x58}, 0x1c) 03:31:29 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127a, &(0x7f0000000140)) 03:31:29 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8) 03:31:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101287, &(0x7f0000000140)) 03:31:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101288, &(0x7f0000000140)) [ 433.348877][T19092] FAT-fs (loop0): bread failed, FSINFO block (sector = 1) 03:31:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9) 03:31:29 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127b, &(0x7f0000000140)) 03:31:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070c9, &(0x7f0000000140)) 03:31:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa) [ 433.494970][ T27] audit: type=1804 audit(1593747090.001:130): pid=19092 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/243/file0/bus" dev="sda1" ino=15811 res=1 03:31:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfc}, 0x1c) 03:31:30 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:30 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127c, &(0x7f0000000140)) 03:31:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070ca, &(0x7f0000000140)) 03:31:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb) 03:31:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070cd, &(0x7f0000000140)) 03:31:30 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127e, &(0x7f0000000140)) [ 434.335780][T19138] FAT-fs (loop0): bread failed, FSINFO block (sector = 1) 03:31:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc) 03:31:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4010ae67, &(0x7f0000000140)) [ 434.464489][ T27] audit: type=1804 audit(1593747090.971:131): pid=19138 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/244/file0/bus" dev="sda1" ino=15905 res=1 03:31:31 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 434.612057][T19162] FAT-fs (loop0): bogus number of reserved sectors [ 434.618885][T19162] FAT-fs (loop0): Can't find a valid FAT filesystem [ 434.712284][ T27] audit: type=1804 audit(1593747091.221:132): pid=19162 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/245/file0/bus" dev="sda1" ino=15763 res=1 03:31:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x1f4}, 0x1c) 03:31:31 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127f, &(0x7f0000000140)) 03:31:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd) 03:31:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4010ae94, &(0x7f0000000140)) 03:31:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:31 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe) 03:31:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4010aeac, &(0x7f0000000140)) [ 435.254669][T19183] FAT-fs (loop0): bogus number of reserved sectors [ 435.285230][T19183] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:31 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x2403, &(0x7f0000000140)) 03:31:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf) 03:31:31 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 435.406695][ T27] audit: type=1804 audit(1593747091.911:133): pid=19183 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/246/file0/bus" dev="sda1" ino=15907 res=1 [ 435.513865][T19206] FAT-fs (loop0): bogus number of reserved sectors [ 435.524634][T19206] FAT-fs (loop0): Can't find a valid FAT filesystem [ 435.596351][ T27] audit: type=1804 audit(1593747092.101:134): pid=19206 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/247/file0/bus" dev="sda1" ino=15755 res=1 03:31:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x218}, 0x1c) 03:31:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x2405, &(0x7f0000000140)) 03:31:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40186366, &(0x7f0000000140)) 03:31:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10) 03:31:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:32 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870c8, &(0x7f0000000140)) 03:31:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870cb, &(0x7f0000000140)) 03:31:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11) [ 436.219194][T19226] FAT-fs (loop0): bogus number of reserved sectors [ 436.234327][T19226] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4b70, &(0x7f0000000140)) 03:31:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870cc, &(0x7f0000000140)) [ 436.346386][ T27] audit: type=1804 audit(1593747092.851:135): pid=19226 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/248/file0/bus" dev="sda1" ino=15890 res=1 03:31:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x241}, 0x1c) 03:31:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12) 03:31:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4020940d, &(0x7f0000000140)) 03:31:33 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:33 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c00, &(0x7f0000000140)) 03:31:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4020ae46, &(0x7f0000000140)) 03:31:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x13) [ 437.109814][T19267] FAT-fs (loop0): bogus number of reserved sectors [ 437.116430][T19267] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4028700f, &(0x7f0000000140)) 03:31:33 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c01, &(0x7f0000000140)) [ 437.222207][ T27] audit: type=1804 audit(1593747093.731:136): pid=19267 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/249/file0/bus" dev="sda1" ino=16337 res=1 03:31:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x14) 03:31:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x300}, 0x1c) 03:31:34 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40485404, &(0x7f0000000140)) 03:31:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x15) 03:31:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:34 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c04, &(0x7f0000000140)) 03:31:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x16) 03:31:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x405c5503, &(0x7f0000000140)) 03:31:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 438.169731][T19310] FAT-fs (loop0): bogus number of reserved sectors [ 438.176470][T19310] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:34 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4c05, &(0x7f0000000140)) 03:31:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4090ae82, &(0x7f0000000140)) 03:31:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x17) [ 438.311858][ T27] audit: type=1804 audit(1593747094.821:137): pid=19310 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/250/file0/bus" dev="sda1" ino=16364 res=1 03:31:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x3e8}, 0x1c) 03:31:35 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x41015500, &(0x7f0000000140)) 03:31:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x18) 03:31:35 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x540a, &(0x7f0000000140)) 03:31:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x19) 03:31:35 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5419, &(0x7f0000000140)) [ 439.057480][T19349] FAT-fs (loop0): bogus number of reserved sectors [ 439.090236][T19349] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x41045508, &(0x7f0000000140)) 03:31:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 439.193265][ T27] audit: type=1804 audit(1593747095.701:138): pid=19349 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/251/file0/bus" dev="sda1" ino=16368 res=1 03:31:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a) 03:31:35 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 439.358119][T19375] FAT-fs (loop0): bogus number of reserved sectors [ 439.366696][T19375] FAT-fs (loop0): Can't find a valid FAT filesystem [ 439.460394][ T27] audit: type=1804 audit(1593747095.971:139): pid=19375 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/252/file0/bus" dev="sda1" ino=16368 res=1 03:31:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4b8}, 0x1c) 03:31:36 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x541b, &(0x7f0000000140)) 03:31:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4138ae84, &(0x7f0000000140)) 03:31:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b) 03:31:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:36 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c) 03:31:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4400ae8f, &(0x7f0000000140)) 03:31:36 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5421, &(0x7f0000000140)) [ 440.032050][T19397] FAT-fs (loop0): bogus number of reserved sectors [ 440.053639][T19397] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:36 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5450, &(0x7f0000000140)) 03:31:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80041284, &(0x7f0000000140)) [ 440.169930][ T27] audit: type=1804 audit(1593747096.681:140): pid=19397 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/253/file0/bus" dev="sda1" ino=16379 res=1 03:31:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x500}, 0x1c) 03:31:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d) 03:31:37 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80041285, &(0x7f0000000140)) 03:31:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:37 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5451, &(0x7f0000000140)) 03:31:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e) [ 440.967152][T19436] FAT-fs (loop0): bogus number of reserved sectors [ 440.989452][T19436] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8004562e, &(0x7f0000000140)) 03:31:37 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5452, &(0x7f0000000140)) 03:31:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x21) 03:31:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 441.123325][ T27] audit: type=1804 audit(1593747097.631:141): pid=19436 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/254/file0/bus" dev="sda1" ino=16364 res=1 03:31:37 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 441.301245][T19463] FAT-fs (loop0): bogus number of reserved sectors [ 441.325739][T19463] FAT-fs (loop0): Can't find a valid FAT filesystem [ 441.404648][ T27] audit: type=1804 audit(1593747097.911:142): pid=19463 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/255/file0/bus" dev="sda1" ino=16366 res=1 [ 441.543021][ T0] NOHZ: local_softirq_pending 08 03:31:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x600}, 0x1c) 03:31:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80047601, &(0x7f0000000140)) 03:31:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x22) 03:31:38 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5460, &(0x7f0000000140)) 03:31:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x139}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:38 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x23) 03:31:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80081270, &(0x7f0000000140)) [ 441.975634][T19481] FAT-fs (loop0): bogus number of reserved sectors 03:31:38 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5501, &(0x7f0000000140)) [ 442.021883][T19481] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x24) 03:31:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80081272, &(0x7f0000000140)) [ 442.159120][ T27] audit: type=1804 audit(1593747098.671:143): pid=19481 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/256/file0/bus" dev="sda1" ino=16377 res=1 03:31:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x700}, 0x1c) 03:31:39 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:39 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5502, &(0x7f0000000140)) 03:31:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25) 03:31:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80084504, &(0x7f0000000140)) 03:31:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x26) 03:31:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80085502, &(0x7f0000000140)) [ 442.913109][T19524] FAT-fs (loop0): bogus number of reserved sectors [ 442.924985][T19524] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:39 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x5509, &(0x7f0000000140)) 03:31:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x27) [ 443.057513][ T27] audit: type=1804 audit(1593747099.561:144): pid=19524 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/257/file0/bus" dev="sda1" ino=16370 res=1 03:31:39 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 443.209494][T19548] FAT-fs (loop0): bogus number of reserved sectors [ 443.222861][T19548] FAT-fs (loop0): Can't find a valid FAT filesystem [ 443.314952][ T27] audit: type=1804 audit(1593747099.821:145): pid=19548 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/258/file0/bus" dev="sda1" ino=16367 res=1 03:31:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x900}, 0x1c) 03:31:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80086301, &(0x7f0000000140)) 03:31:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x28) 03:31:40 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x6364, &(0x7f0000000140)) 03:31:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:40 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x29) 03:31:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8138ae83, &(0x7f0000000140)) [ 443.917659][T19573] FAT-fs (loop0): bogus number of reserved sectors [ 443.970684][T19573] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2a) [ 444.104306][ T27] audit: type=1804 audit(1593747100.611:146): pid=19582 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/259/file0/bus" dev="sda1" ino=16390 res=1 03:31:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140)) 03:31:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa00}, 0x1c) 03:31:41 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2b) 03:31:41 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x6611, &(0x7f0000000140)) 03:31:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140)) 03:31:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2c) 03:31:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0085504, &(0x7f0000000140)) 03:31:41 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x770a, &(0x7f0000000140)) [ 444.837307][T19614] FAT-fs (loop0): invalid media value (0x00) [ 444.856938][T19614] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2d) [ 444.963252][ T27] audit: type=1804 audit(1593747101.471:147): pid=19614 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/260/file0/bus" dev="sda1" ino=16382 res=1 03:31:41 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 445.113613][T19640] FAT-fs (loop0): invalid media value (0x00) [ 445.119913][T19640] FAT-fs (loop0): Can't find a valid FAT filesystem [ 445.205883][ T27] audit: type=1804 audit(1593747101.711:148): pid=19640 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/261/file0/bus" dev="sda1" ino=16367 res=1 03:31:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf00}, 0x1c) 03:31:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc008ae05, &(0x7f0000000140)) 03:31:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2e) 03:31:42 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8902, &(0x7f0000000140)) 03:31:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xd00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:42 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2f) 03:31:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0101282, &(0x7f0000000140)) 03:31:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc01064c7, &(0x7f0000000140)) [ 445.779155][T19657] FAT-fs (loop0): invalid media value (0x00) [ 445.800721][T19657] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:42 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8912, &(0x7f0000000140)) 03:31:42 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x30) [ 445.898975][ T27] audit: type=1804 audit(1593747102.411:149): pid=19657 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/262/file0/bus" dev="sda1" ino=16381 res=1 [ 446.029445][T19680] FAT-fs (loop0): invalid media value (0x00) [ 446.053102][T19680] FAT-fs (loop0): Can't find a valid FAT filesystem [ 446.134575][ T27] audit: type=1804 audit(1593747102.641:150): pid=19680 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/263/file0/bus" dev="sda1" ino=16364 res=1 03:31:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x1802}, 0x1c) 03:31:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc018480d, &(0x7f0000000140)) 03:31:43 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8916, &(0x7f0000000140)) 03:31:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x31) 03:31:43 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x32) 03:31:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0189436, &(0x7f0000000140)) [ 446.788444][T19699] FAT-fs (loop0): invalid media value (0x00) [ 446.807118][T19699] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:43 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8933, &(0x7f0000000140)) 03:31:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 446.906763][ T27] audit: type=1804 audit(1593747103.411:151): pid=19699 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/264/file0/bus" dev="sda1" ino=15751 res=1 03:31:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc018aa3f, &(0x7f0000000140)) 03:31:43 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 447.092264][T19724] FAT-fs (loop0): invalid media value (0x00) [ 447.119883][T19724] FAT-fs (loop0): Can't find a valid FAT filesystem [ 447.202569][ T27] audit: type=1804 audit(1593747103.711:152): pid=19724 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/265/file0/bus" dev="sda1" ino=16363 res=1 03:31:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2000}, 0x1c) 03:31:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x33) 03:31:44 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x8955, &(0x7f0000000140)) 03:31:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc020660b, &(0x7f0000000140)) 03:31:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:44 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x34) 03:31:44 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40042408, &(0x7f0000000140)) 03:31:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc020aa00, &(0x7f0000000140)) 03:31:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1200}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 447.828193][T19746] FAT-fs (loop0): invalid media value (0x00) [ 447.842601][T19746] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0305710, &(0x7f0000000140)) 03:31:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x35) [ 447.976919][ T27] audit: type=1804 audit(1593747104.481:153): pid=19746 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/266/file0/bus" dev="sda1" ino=16380 res=1 03:31:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2ee0}, 0x1c) 03:31:45 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x400454ca, &(0x7f0000000140)) 03:31:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x36) 03:31:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0481273, &(0x7f0000000140)) 03:31:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 448.742492][T19783] FAT-fs (loop0): invalid media value (0x00) [ 448.755325][T19783] FAT-fs (loop0): Can't find a valid FAT filesystem 03:31:45 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x400454cd, &(0x7f0000000140)) 03:31:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x37) 03:31:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc06864a2, &(0x7f0000000140)) [ 448.832790][ T27] audit: type=1804 audit(1593747105.341:154): pid=19783 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/267/file0/bus" dev="sda1" ino=16366 res=1 03:31:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3901}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:45 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40045506, &(0x7f0000000140)) [ 449.043553][T19810] FAT-fs (loop0): invalid media value (0x00) [ 449.052024][T19810] FAT-fs (loop0): Can't find a valid FAT filesystem [ 449.152675][ T27] audit: type=1804 audit(1593747105.661:155): pid=19810 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/268/file0/bus" dev="sda1" ino=16374 res=1 03:31:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4000}, 0x1c) 03:31:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x38) 03:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0bc5310, &(0x7f0000000140)) 03:31:46 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4004550a, &(0x7f0000000140)) 03:31:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:46 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x39) [ 449.686743][T19831] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0d05604, &(0x7f0000000140)) 03:31:46 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40045564, &(0x7f0000000140)) 03:31:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4788}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2) [ 449.892335][ T27] audit: type=1804 audit(1593747106.401:156): pid=19831 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/269/bus" dev="sda1" ino=16369 res=1 03:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3) [ 450.501879][ T0] NOHZ: local_softirq_pending 08 03:31:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4102}, 0x1c) 03:31:47 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3a) 03:31:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4) 03:31:47 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40045566, &(0x7f0000000140)) [ 450.714537][T19876] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3b) 03:31:47 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40049409, &(0x7f0000000140)) 03:31:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5) 03:31:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3c) 03:31:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 450.880746][ T27] audit: type=1804 audit(1593747107.381:157): pid=19876 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/270/bus" dev="sda1" ino=16376 res=1 03:31:47 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 451.057971][T19902] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 451.160665][ T27] audit: type=1804 audit(1593747107.671:158): pid=19902 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/271/bus" dev="sda1" ino=16364 res=1 03:31:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5400}, 0x1c) 03:31:48 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40081271, &(0x7f0000000140)) 03:31:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6) 03:31:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3d) 03:31:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) [ 451.664820][T19919] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3e) 03:31:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7) 03:31:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:48 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40085503, &(0x7f0000000140)) [ 451.817294][ T27] audit: type=1804 audit(1593747108.321:159): pid=19932 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/272/bus" dev="sda1" ino=16370 res=1 03:31:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) [ 451.877183][ T27] audit: type=1804 audit(1593747108.321:160): pid=19919 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/272/bus" dev="sda1" ino=16370 res=1 03:31:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c) [ 452.049440][T19949] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 452.124766][ T27] audit: type=1804 audit(1593747108.631:161): pid=19949 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/273/bus" dev="sda1" ino=16369 res=1 03:31:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5800}, 0x1c) 03:31:49 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8) 03:31:49 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40086602, &(0x7f0000000140)) 03:31:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf0) 03:31:49 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r0, r2, 0x0, 0x8400fffffffb) 03:31:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300) [ 452.595162][T19965] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:49 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 452.669758][ T27] audit: type=1804 audit(1593747109.181:162): pid=19965 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/274/bus" dev="sda1" ino=16382 res=1 03:31:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8847}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:49 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9) 03:31:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500) 03:31:49 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4008ae89, &(0x7f0000000140)) [ 452.846111][T19986] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 452.876058][ T27] audit: type=1804 audit(1593747109.381:163): pid=19986 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/275/file0/bus" dev="loop0" ino=84 res=1 [ 452.922225][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x80fe}, 0x1c) 03:31:50 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa) 03:31:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8848}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600) 03:31:50 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40095505, &(0x7f0000000140)) [ 453.628524][T20007] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 453.658329][ T27] audit: type=1804 audit(1593747110.161:164): pid=20007 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/276/file0/bus" dev="loop0" ino=85 res=1 03:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb) 03:31:50 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:50 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101283, &(0x7f0000000140)) 03:31:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700) 03:31:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 453.734791][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc) [ 453.866579][T20031] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 453.936337][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xb804}, 0x1c) 03:31:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900) 03:31:51 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101286, &(0x7f0000000140)) 03:31:51 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd) 03:31:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 454.573215][T20050] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 454.605979][ T27] kauditd_printk_skb: 1 callbacks suppressed 03:31:51 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00) 03:31:51 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101287, &(0x7f0000000140)) [ 454.605990][ T27] audit: type=1804 audit(1593747111.111:166): pid=20050 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/278/file0/bus" dev="loop0" ino=87 res=1 [ 454.644237][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00) 03:31:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe) [ 454.799846][T20071] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 454.816408][ T27] audit: type=1804 audit(1593747111.321:167): pid=20071 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/279/file0/bus" dev="loop0" ino=88 res=1 [ 454.844181][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xc4ff}, 0x1c) 03:31:51 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10) 03:31:51 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40101288, &(0x7f0000000140)) 03:31:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00) 03:31:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 455.537458][T20091] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:52 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 455.569721][ T27] audit: type=1804 audit(1593747112.081:168): pid=20091 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/280/file0/bus" dev="loop0" ino=89 res=1 03:31:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11) 03:31:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00) 03:31:52 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070c9, &(0x7f0000000140)) 03:31:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 455.612085][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12) [ 455.780482][T20111] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 455.890314][ T27] audit: type=1804 audit(1593747112.401:169): pid=20111 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/281/file0/bus" dev="loop0" ino=90 res=1 [ 455.958933][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe02e}, 0x1c) 03:31:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25) 03:31:52 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070ca, &(0x7f0000000140)) 03:31:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00) 03:31:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:52 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 456.536001][T20132] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c) 03:31:53 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401070cd, &(0x7f0000000140)) [ 456.565584][ T27] audit: type=1804 audit(1593747113.071:170): pid=20132 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/282/file0/bus" dev="loop0" ino=91 res=1 03:31:53 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf00) [ 456.706334][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300) [ 456.875052][T20158] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 456.961476][ T27] audit: type=1804 audit(1593747113.471:171): pid=20158 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/283/file0/bus" dev="loop0" ino=92 res=1 [ 456.988254][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe803}, 0x1c) 03:31:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100) 03:31:53 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40184150, &(0x7f0000000140)) 03:31:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500) 03:31:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:53 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600) 03:31:54 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40186366, &(0x7f0000000140)) 03:31:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200) [ 457.546472][T20177] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1300) [ 457.621457][ T27] audit: type=1804 audit(1593747114.131:172): pid=20177 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/284/file0/bus" dev="loop0" ino=93 res=1 03:31:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1400) 03:31:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 457.785814][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf401}, 0x1c) 03:31:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700) 03:31:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1500) 03:31:54 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:54 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870c8, &(0x7f0000000140)) 03:31:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900) 03:31:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1600) [ 458.554491][T20217] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00) 03:31:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:55 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870cb, &(0x7f0000000140)) 03:31:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00) [ 458.729565][ T27] audit: type=1804 audit(1593747115.241:173): pid=20217 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/285/file0/bus" dev="loop0" ino=94 res=1 [ 458.849090][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfc00}, 0x1c) 03:31:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1700) 03:31:55 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00) 03:31:55 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x401870cc, &(0x7f0000000140)) 03:31:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 459.511092][T20258] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1800) 03:31:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00) 03:31:56 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4020940d, &(0x7f0000000140)) [ 459.589345][ T27] audit: type=1804 audit(1593747116.101:174): pid=20258 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/286/file0/bus" dev="loop0" ino=95 res=1 03:31:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1900) 03:31:56 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 459.728821][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 459.806448][T20282] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 459.840911][ T27] audit: type=1804 audit(1593747116.351:175): pid=20282 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/287/file0/bus" dev="loop0" ino=96 res=1 [ 459.865494][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfe80}, 0x1c) 03:31:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00) 03:31:56 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x4030582a, &(0x7f0000000140)) 03:31:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a00) 03:31:56 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100) [ 460.438371][T20299] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b00) 03:31:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40305839, &(0x7f0000000140)) 03:31:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200) 03:31:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 460.565468][ T27] audit: type=1804 audit(1593747117.071:176): pid=20299 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/288/file0/bus" dev="loop0" ino=97 res=1 03:31:57 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 460.652195][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 460.836614][T20322] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 460.905803][ T27] audit: type=1804 audit(1593747117.411:177): pid=20322 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/289/file0/bus" dev="loop0" ino=98 res=1 [ 460.996609][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff00}, 0x1c) 03:31:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c00) 03:31:57 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x40806685, &(0x7f0000000140)) 03:31:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500) 03:31:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:57 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00) 03:31:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x20000) 03:31:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d00) [ 461.350247][T20343] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e00) 03:31:58 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x41015500, &(0x7f0000000140)) 03:31:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 461.451456][ T27] audit: type=1804 audit(1593747117.961:178): pid=20343 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/290/file0/bus" dev="loop0" ino=99 res=1 [ 461.608426][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff0f}, 0x1c) 03:31:58 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80041284, &(0x7f0000000140)) 03:31:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x40000) 03:31:58 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1f00) 03:31:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000) 03:31:58 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80041285, &(0x7f0000000140)) 03:31:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x60000) [ 462.311966][T20388] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x80000) 03:31:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa0000) [ 462.403824][ T27] audit: type=1804 audit(1593747118.911:179): pid=20388 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/291/file0/bus" dev="loop0" ino=100 res=1 03:31:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 462.540503][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffc4}, 0x1c) 03:31:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc0000) 03:31:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2100) 03:31:59 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80045200, &(0x7f0000000140)) 03:31:59 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:31:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:31:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe0000) 03:31:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2200) 03:31:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000) [ 463.244167][T20422] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:31:59 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80081270, &(0x7f0000000140)) 03:31:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2300) [ 463.333686][ T27] audit: type=1804 audit(1593747119.841:180): pid=20422 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/292/file0/bus" dev="loop0" ino=101 res=1 03:31:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 463.427767][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x34000}, 0x1c) 03:32:00 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(0x0, 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2400) 03:32:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000) 03:32:00 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80081272, &(0x7f0000000140)) 03:32:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500) [ 464.179144][T20463] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000000) 03:32:00 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80085502, &(0x7f0000000140)) 03:32:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2600) [ 464.370396][ T27] audit: type=1804 audit(1593747120.881:181): pid=20463 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/293/file0/bus" dev="loop0" ino=102 res=1 03:32:00 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x80086301, &(0x7f0000000140)) [ 464.501886][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x40000}, 0x1c) 03:32:01 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(0x0, 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000) 03:32:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x139}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2700) 03:32:01 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140)) [ 465.093651][T20506] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5000000) 03:32:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2800) [ 465.228450][ T27] audit: type=1804 audit(1593747121.731:182): pid=20506 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/294/file0/bus" dev="loop0" ino=103 res=1 03:32:01 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140)) 03:32:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:01 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(0x0, 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:01 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc008240a, &(0x7f0000000140)) [ 465.354019][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 465.445543][T20533] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 465.515484][ T27] audit: type=1804 audit(1593747122.021:183): pid=20533 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/295/file0/bus" dev="loop0" ino=104 res=1 [ 465.573666][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x50000}, 0x1c) 03:32:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000) 03:32:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2900) 03:32:02 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0085504, &(0x7f0000000140)) 03:32:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:02 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2a00) [ 466.052661][T20556] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2b00) 03:32:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2c00) [ 466.133728][ T27] audit: type=1804 audit(1593747122.641:184): pid=20556 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/296/file0/bus" dev="loop0" ino=105 res=1 03:32:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2d00) 03:32:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7000000) [ 466.284819][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x400300}, 0x1c) 03:32:03 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0101282, &(0x7f0000000140)) 03:32:03 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2e00) 03:32:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000) 03:32:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2f00) 03:32:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9000000) 03:32:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000) [ 466.996186][T20594] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 467.079773][ T27] audit: type=1804 audit(1593747123.591:185): pid=20594 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/297/file0/bus" dev="loop0" ino=106 res=1 03:32:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb000000) 03:32:03 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0189436, &(0x7f0000000140)) 03:32:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 467.263166][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x1000000}, 0x1c) 03:32:04 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000) 03:32:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000) 03:32:04 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc020660b, &(0x7f0000000140)) 03:32:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3100) 03:32:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd000000) [ 467.993673][T20638] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:04 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(0x0, 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 468.034656][ T27] audit: type=1804 audit(1593747124.541:186): pid=20638 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/298/file0/bus" dev="loop0" ino=107 res=1 [ 468.069647][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:04 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc028660f, &(0x7f0000000140)) 03:32:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3200) [ 468.269970][T20659] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 468.354507][ T27] audit: type=1804 audit(1593747124.851:187): pid=20659 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/299/file0/bus" dev="loop0" ino=108 res=1 [ 468.428842][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2000000}, 0x1c) 03:32:05 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc028aa03, &(0x7f0000000140)) 03:32:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000) 03:32:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3300) 03:32:05 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(0x0, 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000) [ 468.878050][T20681] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:05 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(0x0, 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:05 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc040564a, &(0x7f0000000140)) 03:32:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3400) [ 468.920272][ T27] audit: type=1804 audit(1593747125.431:188): pid=20681 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/300/file0/bus" dev="loop0" ino=109 res=1 [ 468.957464][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3500) [ 469.148476][T20703] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 469.192015][ T27] audit: type=1804 audit(1593747125.701:189): pid=20703 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/301/file0/bus" dev="loop0" ino=110 res=1 [ 469.226362][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x3000000}, 0x1c) 03:32:06 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0481273, &(0x7f0000000140)) 03:32:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11000000) 03:32:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3600) 03:32:06 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3700) 03:32:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12000000) [ 469.831980][T20721] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:06 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0xc0f85403, &(0x7f0000000140)) 03:32:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25000000) 03:32:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3800) [ 470.029569][ T27] audit: type=1804 audit(1593747126.541:190): pid=20739 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/302/bus" dev="sda1" ino=16377 res=1 [ 470.134371][ T27] audit: type=1804 audit(1593747126.591:191): pid=20721 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/302/bus" dev="sda1" ino=16377 res=1 03:32:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4000000}, 0x1c) 03:32:07 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c000000) 03:32:07 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2) 03:32:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3900) 03:32:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:07 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3) [ 470.790279][T20763] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1200}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3a00) 03:32:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000) 03:32:07 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4) 03:32:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000000000) [ 470.928318][ T27] audit: type=1804 audit(1593747127.431:192): pid=20763 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/303/bus" dev="sda1" ino=16368 res=1 [ 471.039926][ T27] audit: type=1804 audit(1593747127.431:193): pid=20763 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/303/bus" dev="sda1" ino=16368 res=1 03:32:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5000000}, 0x1c) 03:32:08 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3b00) 03:32:08 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5) 03:32:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000000000) 03:32:08 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6) [ 471.747806][T20803] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3c00) 03:32:08 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000000000) [ 471.800405][ T27] audit: type=1804 audit(1593747128.311:194): pid=20803 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/304/file0/bus" dev="loop0" ino=111 res=1 [ 471.854659][ T27] audit: type=1804 audit(1593747128.321:195): pid=20803 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/304/file0/bus" dev="loop0" ino=111 res=1 03:32:08 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(0x0, &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3901}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3d00) [ 471.943961][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 472.078155][T20831] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 472.123779][ T27] audit: type=1804 audit(1593747128.631:196): pid=20831 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/305/file0/bus" dev="loop0" ino=112 res=1 [ 472.158844][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x6000000}, 0x1c) 03:32:09 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7) 03:32:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000000000) 03:32:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3e00) 03:32:09 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(0x0, &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 472.661247][T20845] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:09 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(0x0, &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 472.709962][ T27] audit: type=1804 audit(1593747129.221:197): pid=20845 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/306/file0/bus" dev="loop0" ino=113 res=1 03:32:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f00) 03:32:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000000000) 03:32:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4788}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 472.757857][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:09 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8) 03:32:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000000000) [ 472.933892][T20865] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 473.052751][ T27] audit: type=1804 audit(1593747129.561:198): pid=20876 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/307/file0/bus" dev="loop0" ino=114 res=1 [ 473.164794][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x7000000}, 0x1c) 03:32:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000) 03:32:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000000000) 03:32:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:10 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9) 03:32:10 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00) 03:32:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000000000000) [ 473.673310][T20891] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:10 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf0ff) 03:32:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xfff0) [ 473.708060][ T27] audit: type=1804 audit(1593747130.211:199): pid=20891 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/308/file0/bus" dev="loop0" ino=115 res=1 [ 473.756726][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 473.913823][T20913] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 473.984542][ T27] audit: type=1804 audit(1593747130.491:200): pid=20913 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/309/file0/bus" dev="loop0" ino=116 res=1 [ 474.049143][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8000000}, 0x1c) 03:32:11 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa) 03:32:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x200000000000000) 03:32:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x20000) 03:32:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:11 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x40000) 03:32:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300000000000000) [ 474.580445][T20931] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:11 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) [ 474.670527][ T27] audit: type=1804 audit(1593747131.181:201): pid=20931 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/310/file0/bus" dev="loop0" ino=117 res=1 03:32:11 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb) [ 474.715996][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:11 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc) [ 474.859192][T20954] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 474.955628][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x9000000}, 0x1c) 03:32:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x60000) 03:32:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x400000000000000) 03:32:12 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd) 03:32:12 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) 03:32:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:12 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe) 03:32:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500000000000000) 03:32:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x80000) [ 475.621107][T20978] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:12 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10) 03:32:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8847}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600000000000000) [ 475.879754][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa000000}, 0x1c) 03:32:13 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11) 03:32:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa0000) 03:32:13 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r2, 0x0, 0x8400fffffffb) 03:32:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700000000000000) 03:32:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8848}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 476.559867][T21018] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:13 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x800000000000000) 03:32:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc0000) 03:32:13 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12) [ 476.601323][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 476.601334][ T27] audit: type=1804 audit(1593747133.111:204): pid=21018 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/313/file0/bus" dev="loop0" ino=120 res=1 [ 476.638266][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:13 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25) [ 476.812852][T21035] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 476.864661][ T27] audit: type=1804 audit(1593747133.371:205): pid=21035 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/314/file0/bus" dev="loop0" ino=121 res=1 [ 476.929219][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf000000}, 0x1c) 03:32:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900000000000000) 03:32:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe0000) 03:32:13 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:13 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c) 03:32:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 477.491043][T21055] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000) 03:32:14 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300) 03:32:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00000000000000) [ 477.629862][ T27] audit: type=1804 audit(1593747134.141:206): pid=21055 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/315/file0/bus" dev="loop0" ino=122 res=1 03:32:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:14 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000) [ 477.741390][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 477.853938][T21084] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 477.920471][ T27] audit: type=1804 audit(1593747134.431:207): pid=21084 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/316/file0/bus" dev="loop0" ino=123 res=1 [ 477.949697][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x12903da4}, 0x1c) 03:32:14 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500) 03:32:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00000000000000) 03:32:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x34000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000) 03:32:14 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0), 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000000) 03:32:15 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600) 03:32:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00000000000000) [ 478.541515][T21103] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 478.607379][ T27] audit: type=1804 audit(1593747135.111:208): pid=21103 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/317/file0/bus" dev="loop0" ino=124 res=1 03:32:15 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700) 03:32:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x400300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000) [ 478.734378][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x18020000}, 0x1c) 03:32:15 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0), 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:15 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900) 03:32:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00000000000000) 03:32:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5000000) 03:32:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 479.463935][T21141] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00000000000000) 03:32:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000) 03:32:16 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00) 03:32:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000000) [ 479.633358][ T27] audit: type=1804 audit(1593747136.141:209): pid=21150 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/318/bus" dev="sda1" ino=16366 res=1 03:32:16 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0), 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 479.785607][ T27] audit: type=1804 audit(1593747136.171:210): pid=21141 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/318/bus" dev="sda1" ino=16366 res=1 [ 479.875381][T21166] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 479.972494][ T27] audit: type=1804 audit(1593747136.481:211): pid=21166 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/319/file0/bus" dev="sda1" ino=16368 res=1 03:32:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x20000000}, 0x1c) 03:32:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7000000) 03:32:16 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00) 03:32:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:16 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{0x0}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100000000000000) 03:32:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000) [ 480.436306][T21183] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9000000) 03:32:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000) [ 480.510040][ T27] audit: type=1804 audit(1593747137.021:212): pid=21183 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/320/file0/bus" dev="loop0" ino=125 res=1 03:32:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb000000) 03:32:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200000000000000) 03:32:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2d502a37}, 0x1c) 03:32:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000) 03:32:17 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00) 03:32:17 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{0x0}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 480.665153][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500000000000000) 03:32:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd000000) [ 480.807502][T21219] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00000000000000) 03:32:17 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00) 03:32:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xffffffffffffffff) 03:32:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40c580) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x4, 0x9, 0x0, 0x1d, "007bc247cbd5692e69613c77872eaf6bfaf4b609a631e83aa966d739b89aa3c165f8f8656269dde6133eee6cc7898ca87bc156b39fe97600", "dbbc2ce61adf35fc7e47afe3b8f11cbe01dc00", [0x5, 0x80000005]}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) ppoll(&(0x7f0000000180)=[{r3, 0x9000}, {r1}, {r1, 0x8064}], 0x3, &(0x7f00000001c0), &(0x7f0000000200)={[0x5]}, 0x8) [ 480.959478][ T27] audit: type=1804 audit(1593747137.471:213): pid=21219 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/321/file0/bus" dev="sda1" ino=16375 res=1 03:32:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000) 03:32:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x372a502d}, 0x1c) 03:32:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:18 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{0x0}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf000000) 03:32:18 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00) 03:32:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000) 03:32:18 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100) [ 481.753922][T21259] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:18 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 481.839081][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 481.839092][ T27] audit: type=1804 audit(1593747138.341:215): pid=21259 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/322/file0/bus" dev="loop0" ino=126 res=1 03:32:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11000000) [ 481.911411][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:18 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200) 03:32:18 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0xf000000, 0x400, 0x8, r1, 0x0, &(0x7f00000000c0)={0x9b0907, 0x3, [], @string=&(0x7f0000000080)=0x6}}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r7, r5, 0x9}, 0x10) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f00000001c0)={0x0, r5}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$SG_SET_FORCE_PACK_ID(r8, 0x227b, &(0x7f0000000200)) r9 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r9, 0x127d, &(0x7f0000000140)) [ 482.098780][T21283] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 482.175958][ T27] audit: type=1804 audit(1593747138.681:216): pid=21283 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/323/file0/bus" dev="loop0" ino=127 res=1 [ 482.214451][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x40000000}, 0x1c) 03:32:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12000000) 03:32:19 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500) 03:32:19 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:19 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000180)) fallocate(r0, 0x0, 0x6, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x44403, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x8000) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000200)={r5}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f00000000c0)={0x400, 0x50e, 0x1, 0x9, 0x3, 0x38}) [ 482.723046][T21307] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:19 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f00) 03:32:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x13000000) 03:32:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7fffffff, 0x302c2) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) fcntl$addseals(r2, 0x409, 0x4) [ 482.921234][ T27] audit: type=1804 audit(1593747139.431:217): pid=21307 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/324/file0/bus" dev="sda1" ino=16375 res=1 03:32:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x14000000) 03:32:19 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 483.134861][T21340] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 483.161878][ T27] audit: type=1804 audit(1593747139.671:218): pid=21340 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/325/file0/bus" dev="loop0" ino=128 res=1 [ 483.210117][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x41020000}, 0x1c) 03:32:20 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00) 03:32:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:20 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x15000000) 03:32:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x16000000) [ 483.599518][T21353] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:20 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x17000000) 03:32:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 483.679155][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)) 03:32:20 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000) 03:32:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x18000000) [ 483.839287][T21372] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 483.905798][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x54000000}, 0x1c) 03:32:21 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x19000000) 03:32:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:21 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000) 03:32:21 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) 03:32:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a000000) [ 484.568370][T21396] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:21 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b000000) 03:32:21 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000000) [ 484.648244][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c000000) [ 484.802177][T21419] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 484.908468][ T27] audit: type=1804 audit(1593747141.411:219): pid=21419 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/329/file0/bus" dev="loop0" ino=132 res=1 [ 484.986699][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x58000000}, 0x1c) 03:32:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) r1 = socket$packet(0x11, 0x3, 0x300) dup2(r1, r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup2(r4, r4) r6 = dup2(r5, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000100)={0xffffffffffffff78, &(0x7f0000000180)=""/136}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xfffa) r8 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0xe, 0x7, 0x84, 0x20, 0x0, 0x3, 0x300, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x5c48, 0x8000000000000200}, 0x800, 0x2, 0x401, 0x3, 0x10001, 0x4ab8, 0x4}, 0x0, 0xf, r7, 0x3) ioctl$FS_IOC_GETFLAGS(r8, 0x80086601, &(0x7f0000000000)) r9 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r9, 0x127d, &(0x7f0000000140)) 03:32:22 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000) 03:32:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d000000) 03:32:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:22 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e000000) 03:32:22 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5000000) [ 485.582719][T21444] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:22 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1f000000) [ 485.664236][ T27] audit: type=1804 audit(1593747142.171:220): pid=21444 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/330/file0/bus" dev="loop0" ino=133 res=1 [ 485.702580][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x20000000) [ 485.887286][T21467] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 485.953358][ T27] audit: type=1804 audit(1593747142.461:221): pid=21467 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/331/file0/bus" dev="loop0" ino=134 res=1 [ 485.977118][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8dffffff}, 0x1c) 03:32:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x21000000) 03:32:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x0, 0x0, 0x5}}}}]}, 0x78}}, 0x0) recvfrom$packet(r0, &(0x7f0000000180)=""/197, 0xc5, 0x40000100, &(0x7f0000000100)={0x11, 0x1b, r2, 0x1, 0x4, 0x6, @remote}, 0x14) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000140)) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x11, 0x1, 0x7, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x20) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000000)={0x9, 0x0, 0x9, 0x0, 0x20, 0xc1, 0x3, 0x88, 0xa8, 0x2, 0x0, 0x3, 0x1}, 0xe) 03:32:22 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000) 03:32:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:22 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x22000000) [ 486.514739][T21483] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:23 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7000000) 03:32:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x23000000) [ 486.593955][ T27] audit: type=1804 audit(1593747143.101:222): pid=21483 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/332/file0/bus" dev="loop0" ino=135 res=1 03:32:23 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, 0x0, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x24000000) [ 486.702765][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 486.874768][T21510] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 486.933588][ T27] audit: type=1804 audit(1593747143.441:223): pid=21510 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/333/file0/bus" dev="loop0" ino=136 res=1 [ 486.990092][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x91ffffff}, 0x1c) 03:32:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:23 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000) 03:32:23 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xbd, 0x2, 0xc1, "04fe0979fa8bda6677b46983e7508f78", "7e0f8f7e7195074cd5a22abe3f60487928cb7f30bd138e17809624e577f29579c011b83da3f08c57086b682c27cd20c12d69c3a87f5b96a71b90628caf9e40a2909bd638d8dc38fe27718b663a8f9e46bfa3d6c5d755d8369427ce64b4fed8259f95ae41945897630eb2ed3a82175a9fdfc7926daf9363c3d2bed779acd64a7a2aabcec85e4133135b69957fc9697de5b1891813a08bbd8a3c291e028325ddccc0e7e8de21ae6552"}, 0xbd, 0x2) 03:32:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25000000) 03:32:23 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, 0x0, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x26000000) [ 487.518079][T21530] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:24 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9000000) 03:32:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x25000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:24 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000) [ 487.698828][ T27] audit: type=1804 audit(1593747144.201:224): pid=21540 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/334/bus" dev="sda1" ino=16375 res=1 03:32:24 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, 0x0, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x27000000) [ 487.764957][ T27] audit: type=1804 audit(1593747144.211:225): pid=21530 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/334/bus" dev="sda1" ino=16375 res=1 [ 487.906435][ T27] audit: type=1804 audit(1593747144.411:226): pid=21555 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/335/bus" dev="sda1" ino=16376 res=1 03:32:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa43d9012}, 0x1c) 03:32:24 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb000000) 03:32:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x39010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x28000000) 03:32:24 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x83) 03:32:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x35af804b, 0x50302) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) accept4$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x800) [ 488.466608][T21577] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:25 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000) 03:32:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x29000000) 03:32:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2a000000) [ 488.598219][ T27] audit: type=1804 audit(1593747145.101:227): pid=21577 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/336/file0/bus" dev="loop0" ino=137 res=1 03:32:25 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd000000) [ 488.708583][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xb8040000}, 0x1c) 03:32:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2b000000) 03:32:25 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:25 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000) 03:32:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 489.455127][T21616] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2c000000) 03:32:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000) 03:32:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 489.622756][ T27] audit: type=1804 audit(1593747146.131:228): pid=21616 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/337/file0/bus" dev="sda1" ino=16366 res=1 03:32:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xc4ff0000}, 0x1c) 03:32:26 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2d000000) 03:32:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffbffff, 0x345282) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11000000) 03:32:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 489.870650][T21647] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x3a1100, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r1, 0x8010550e, &(0x7f0000000100)={0x9, &(0x7f0000000080)="c6cc4b546934d1f835c5aa8f36fa912730894ffe814cfdcae8334056ed3a1ad9d7666cd3bf1fc1f56cdbb892ee10d841acca7f838fe276038c2477e7184ae438c4c22d1c17c36ebc65477e89168aaeebf1d096dede150bd67181101266186ea007a3ba06a2688d90cbc82cfca2ae9c59c27afb4b76cd166bc1ab484eec9a"}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x84800, 0x0) getpeername$qrtr(r2, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000240)={0xffffff01, 0x2, "ba089f7831621a5c5ea89b6cd06ec2b7aa94398078e6159932c61d65079d29a1", 0x100, 0x7d7c, 0xa9d, 0x4, 0x226}) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 490.012821][ T27] audit: type=1804 audit(1593747146.511:229): pid=21647 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/338/file0/bus" dev="loop0" ino=138 res=1 03:32:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2e000000) 03:32:26 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12000000) 03:32:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2f000000) 03:32:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88470000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:26 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 490.197840][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 490.315694][ T27] audit: type=1804 audit(1593747146.821:230): pid=21673 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/339/bus" dev="sda1" ino=15812 res=1 03:32:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xc4ffffff}, 0x1c) 03:32:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x30000000) 03:32:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2) 03:32:27 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25000000) 03:32:27 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88480000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x31000000) [ 490.791095][T21689] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x48202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1132}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000000)=0x3) 03:32:27 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:27 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f000000) 03:32:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 490.871232][ T27] audit: type=1804 audit(1593747147.381:231): pid=21689 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/340/file0/bus" dev="loop0" ino=139 res=1 [ 490.907093][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x32000000) [ 491.136240][T21710] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 491.217068][ T27] audit: type=1804 audit(1593747147.721:232): pid=21710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/341/file0/bus" dev="loop0" ino=140 res=1 [ 491.246692][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe02e0000}, 0x1c) 03:32:28 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c000000) 03:32:28 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x33000000) 03:32:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x34000000) 03:32:28 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) 03:32:28 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000) [ 491.775639][T21733] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xefffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:28 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000000000000) 03:32:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x35000000) [ 492.048777][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe0ffffff}, 0x1c) 03:32:29 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffa) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:29 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x200000000000000) 03:32:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x36000000) 03:32:29 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000690003080000001aa903fb7f0000008000000000080001"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x440400) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:32:29 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300000000000000) [ 492.734628][T21776] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x37000000) 03:32:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x38000000) [ 492.902371][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 492.902382][ T27] audit: type=1804 audit(1593747149.411:234): pid=21776 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/343/file0/bus" dev="loop0" ino=142 res=1 03:32:29 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 493.020906][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 493.154085][T21802] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 493.230051][ T27] audit: type=1804 audit(1593747149.741:235): pid=21802 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/344/file0/bus" dev="loop0" ino=143 res=1 [ 493.271187][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe8030000}, 0x1c) 03:32:30 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x400000000000000) 03:32:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x39000000) 03:32:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r6, 0x0, r2, 0x0, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r8 = socket$nl_route(0x10, 0x3, 0x0) splice(r7, 0x0, r8, 0x0, 0x1420000a7a, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r9, &(0x7f0000000000)=ANY=[], 0xfffa) r10 = socket$packet(0x11, 0x3, 0x300) dup2(r10, r10) ioctl$sock_inet_SIOCSIFNETMASK(r10, 0x891c, &(0x7f0000000080)={'virt_wifi0\x00', {0x2, 0x4e21, @empty}}) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) 03:32:30 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3a000000) [ 493.673266][T21822] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:30 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500000000000000) 03:32:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3b000000) 03:32:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 493.856073][ T27] audit: type=1804 audit(1593747150.361:236): pid=21822 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/345/file0/bus" dev="loop0" ino=144 res=1 03:32:30 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600000000000000) 03:32:30 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 493.987524][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 494.137621][ T27] audit: type=1804 audit(1593747150.641:237): pid=21850 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/346/bus" dev="sda1" ino=16371 res=1 03:32:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf4010000}, 0x1c) 03:32:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3c000000) 03:32:31 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700000000000000) 03:32:31 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3d000000) 03:32:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r1, 0xffffffffffffffff) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x11, 0x28, 0x8, 0x2, 0xb, 0x7, 0x5, 0xf5, 0x1}}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x1f, 0x8, 0x1f, 0x7}, {0x5, 0x3, 0x4}, {0x0, 0x8, 0x1f, 0x800}, {0x8, 0x81, 0x80}, {0xffc0, 0xf, 0x7f, 0x3c}, {0x1000, 0x3, 0x5, 0x1000000}, {0x0, 0x1, 0x4, 0x7fff}, {0x34, 0x8, 0xfe, 0xfffffffe}, {0x100, 0x4, 0xa7, 0x2}]}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)=""/254) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) r7 = socket$packet(0x11, 0x3, 0x300) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(r8, 0xc028564e, &(0x7f0000000180)={0x2, 0x1, [0x1, 0x2, 0x3f, 0x1000, 0x5, 0x9, 0xfff, 0x7fff]}) [ 494.649476][T21865] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:31 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x0, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:31 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x800000000000000) [ 494.717685][ T27] audit: type=1804 audit(1593747151.221:238): pid=21865 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/347/file0/bus" dev="loop0" ino=145 res=1 [ 494.782165][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3e000000) 03:32:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:31 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900000000000000) [ 494.927909][T21885] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 495.014025][ T27] audit: type=1804 audit(1593747151.521:239): pid=21885 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/348/file0/bus" dev="loop0" ino=146 res=1 [ 495.114980][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf5ffffff}, 0x1c) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f000000) 03:32:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000)=0x93, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:32:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffef}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00000000000000) 03:32:32 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x0, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x40000000) 03:32:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) fcntl$getflags(r0, 0x401) [ 495.621781][T21912] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c000000) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf0ffffff) 03:32:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00000000000000) 03:32:32 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x0, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 495.760341][ T27] audit: type=1804 audit(1593747152.271:240): pid=21912 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/349/file0/bus" dev="loop0" ino=147 res=1 [ 495.788768][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfc000000}, 0x1c) 03:32:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xfffffff0) 03:32:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000000c0)={0xd, "43cbea396b77c73a63935a9994"}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xf9e, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000140)=0x2) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 03:32:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00000000000000) [ 495.937385][T21943] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000) 03:32:32 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 496.026683][ T27] audit: type=1804 audit(1593747152.531:241): pid=21943 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/350/file0/bus" dev="loop0" ino=148 res=1 [ 496.058826][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000000000) 03:32:32 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00000000000000) 03:32:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000000000) 03:32:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 496.238748][T21964] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 496.339881][ T27] audit: type=1804 audit(1593747152.851:242): pid=21964 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/351/file0/bus" dev="loop0" ino=149 res=1 [ 496.389008][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfe800000}, 0x1c) 03:32:33 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000000000) [ 496.880012][T21983] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:33 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x4c4081) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 03:32:33 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00000000000000) 03:32:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000000000) [ 497.005498][ T27] audit: type=1804 audit(1593747153.511:243): pid=21983 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/352/file0/bus" dev="loop0" ino=150 res=1 03:32:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000000000) 03:32:33 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000000) 03:32:33 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:33 executing program 1: ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, &(0x7f0000000000)=0x73) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x400, 0x0) [ 497.105556][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 497.308419][T22017] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 497.410447][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfe80ffff}, 0x1c) 03:32:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000000000) 03:32:34 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100000000000000) 03:32:34 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a7a, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffa) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x80100, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000100)=0x2) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0)) getsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000), &(0x7f0000000080)=0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffa) r6 = socket$packet(0x11, 0x3, 0x300) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r7, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004001}, 0x4040000) dup2(r6, r6) fcntl$dupfd(r5, 0x0, r6) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0) 03:32:34 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000000000) [ 497.874664][T22038] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:34 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200000000000000) 03:32:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000000000) 03:32:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 497.991661][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 497.991672][ T27] audit: type=1804 audit(1593747154.501:245): pid=22038 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/354/file0/bus" dev="loop0" ino=152 res=1 03:32:34 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 498.088515][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:34 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500000000000000) [ 498.217008][ T27] audit: type=1804 audit(1593747154.721:246): pid=22061 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/355/bus" dev="sda1" ino=16371 res=1 03:32:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfec0ffff}, 0x1c) 03:32:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000000000000) 03:32:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:35 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:35 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f00000000000000) 03:32:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x200000000000000) 03:32:35 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f0000000040)=""/87, 0x57, &(0x7f00000000c0)=""/66, 0x2}}, 0x48) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffffffc, 0x470000) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000180)={0x0, 0x0, @ioapic}) 03:32:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300000000000000) 03:32:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 498.927831][T22089] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x400000000000000) 03:32:35 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00000000000000) [ 499.024736][ T27] audit: type=1804 audit(1593747155.531:247): pid=22089 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/356/file0/bus" dev="loop0" ino=153 res=1 03:32:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500000000000000) [ 499.117627][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff000000}, 0x1c) 03:32:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:36 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x36, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600000000000000) 03:32:36 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) r0 = msgget(0x0, 0x280) msgctl$IPC_RMID(r0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000080)=""/177) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:32:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x6, 0x0, 0x200, 0x1, 0x1, 0x8, 0x19, "91a64cd65a4efc20cb55d04731058dd3bed3e534", "30d079015928e3f1bacbfe500f8046157142d64c"}) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3) 03:32:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700000000000000) [ 499.773146][T22124] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:36 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x800000000000000) 03:32:36 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000180)=""/181) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x10080) fchdir(0xffffffffffffffff) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x980000, 0x4, 0x72, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9909c9, 0x40, [], @p_u32=&(0x7f0000000000)=0x8}}) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000140)) [ 499.841326][ T27] audit: type=1804 audit(1593747156.351:248): pid=22124 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/357/file0/bus" dev="loop0" ino=154 res=1 [ 499.868629][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900000000000000) [ 500.051222][T22146] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 500.097607][ T27] audit: type=1804 audit(1593747156.601:249): pid=22146 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/358/file0/bus" dev="loop0" ino=155 res=1 [ 500.153347][ T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff0f0000}, 0x1c) 03:32:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) clone(0x30850800, &(0x7f0000000080)="7b2aea9c69dde82e30c3095baff3bac06c8abc43c28e3dec2f7e61e1a6f748f76988b7d3bc093d637b038a5fdd89da4bb8a6ea553161235403d5b837237a04f04f4f410f2e7820d2441119cca025576aa7833213bd08d6d6a9b5f024a6ad16d3070c5aab41ee8aa5e5cc9c7a2da5fdcd5704a3aaca89cf22ffe11ad605ecbdc3f50482912d213323ef788b9b7a", &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0)="806b880e7c7665330d0776e40e88daa020420a40bf9a23ea40da06d998779404ed88264efad515d527adba71436d6b166fda8d94a39624fd3a76c22680df57ad9c8d40157d02453891264b6698cba96f6f93fdd82ad48cfee70018bfeabb4e29eb2fb690d4abd291ab699487fd083cb429caa8e38de277eb22277195422e3d15179c82c4572167b4556d6d067237d973c5b6488f1183fd0fc125213f726f2366c53ae644944be07b3931c7af61ec603056b879e106") 03:32:37 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00000000000000) 03:32:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00000000000000) 03:32:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 500.791791][ T27] audit: type=1804 audit(1593747157.301:250): pid=22164 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/359/bus" dev="sda1" ino=16366 res=1 03:32:37 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5}) sendfile(r1, r3, 0x0, 0x8400fffffffb) 03:32:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00000000000000) [ 500.955367][T22182] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x10002) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000240)={0x5, 0x5}) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000200)={0x980000, 0x3, 0xfc, r1, 0x0, &(0x7f00000001c0)={0xa20929, 0xe5, [], @p_u8=&(0x7f0000000180)=0x6}}) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x6, 0x9, 0x1e, 0x14, "8a52db6daa3a34fac4979f0856bd97bfef35f8df316628abf30b53493e90ab59f07af0e4f5ca92c10d3e7b2af3d06e8e34efebc6e2a1326661184ae09f4de39b", "b7527a1fe6ca0d667535929b620d217b58d097867638b8473a0e7d1599b55241", [0x1d7b, 0x4]}) 03:32:37 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5}) sendfile(r1, r3, 0x0, 0x8400fffffffb) [ 501.042778][ T27] audit: type=1804 audit(1593747157.551:251): pid=22182 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/360/file0/bus" dev="loop0" ino=156 res=1 [ 501.072448][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 501.234884][ T27] audit: type=1804 audit(1593747157.741:252): pid=22192 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/361/bus" dev="sda1" ino=16375 res=1 03:32:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffff0000}, 0x1c) 03:32:38 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0xa8380, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000440)=0x0, &(0x7f00000004c0)) ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000500)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x9c0000, 0x8, 0x9, r1, 0x0, &(0x7f0000000080)={0x3b0920, 0xfffffff7, [], @p_u8=&(0x7f0000000000)=0xc1}}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000480)='devlink\x00') r8 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000800)={0x0, 0x9, &(0x7f0000000400)={&(0x7f0000000000)={0x3c, r7, 0x536ae464467e3e0b, 0x5000000, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r7, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x801}, 0x4851) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00000000000000) 03:32:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:38 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r4, [], "1b"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb) 03:32:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00000000000000) [ 501.758246][ T27] audit: type=1804 audit(1593747158.261:253): pid=22206 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/362/bus" dev="sda1" ino=16366 res=1 03:32:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:38 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r4, [], "1b"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb) 03:32:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf00000000000000) [ 502.000582][ T27] audit: type=1804 audit(1593747158.511:254): pid=22218 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/363/bus" dev="sda1" ino=16368 res=1 03:32:38 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x1) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3) keyctl$read(0xb, r4, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r4, [], "1b"}) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb) 03:32:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000000) 03:32:38 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x181000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000280)={0x4, "d1ec42fd24ff22c0955a8aa0e902366c1385e0be115ea6c98eab37a4c96807d5", 0x2, 0x4, 0x3, 0x2000000, 0x2000001, 0x2}) r8 = socket$inet6_icmp(0xa, 0x2, 0x3a) readahead(r8, 0x5, 0x7) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000708df88e08ba78eaae80f31ebb34adb433ef71d2cf08be649620edf839118e10be6e4ffa3134cf047db0789bf28a4af1d59bd2db1e8ea93de540afa35600000000000000", @ANYRES16=r7, @ANYBLOB="010000000000000000000a0000000800048004000a80"], 0x1c}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xc8, r7, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}]}, @TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3b6d32f9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x4008016) r9 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r9, 0x0, 0x1420000a7a, 0x0) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000140)=0x9) 03:32:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffff80fe}, 0x1c) 03:32:40 executing program 2: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull\x00', 0x80, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x3) keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000006c0)={0x1cf, 0x11, &(0x7f00000002c0)="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"}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0) flock(r2, 0xb) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffa) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, 0x140b, 0x10, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}}, 0x4000) getsockname$llc(r4, &(0x7f0000000080), &(0x7f00000000c0)=0x10) openat$smackfs_syslog(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/syslog\x00', 0x2, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000140)) 03:32:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100000000000000) 03:32:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:40 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb) 03:32:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x40202) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x200) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000080)=0x2) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) r2 = msgget(0x0, 0x280) msgctl$IPC_RMID(r2, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000100)=0x21) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r6, &(0x7f0000000100)=0x4) msgctl$IPC_RMID(r2, 0x0) 03:32:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffc0fe}, 0x1c) 03:32:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200000000000000) [ 503.648097][T22292] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1300000000000000) [ 503.705928][T22298] sctp: [Deprecated]: syz-executor.1 (pid 22298) Use of int in maxseg socket option. [ 503.705928][T22298] Use struct sctp_assoc_value instead 03:32:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1400000000000000) 03:32:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1500000000000000) [ 503.792022][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 503.792032][ T27] audit: type=1804 audit(1593747160.301:256): pid=22292 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/365/file0/bus" dev="sda1" ino=16364 res=1 03:32:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1600000000000000) [ 504.432634][T22298] sctp: [Deprecated]: syz-executor.1 (pid 22298) Use of int in maxseg socket option. [ 504.432634][T22298] Use struct sctp_assoc_value instead 03:32:41 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0xa004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1700000000000000) 03:32:41 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb) 03:32:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) fchown(r0, r1, r2) 03:32:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffff8d}, 0x1c) [ 504.698720][T22335] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1800000000000000) 03:32:41 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x44402) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) 03:32:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 504.808009][ T27] audit: type=1804 audit(1593747161.311:257): pid=22344 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/366/file0/bus" dev="loop0" ino=157 res=1 03:32:41 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb) 03:32:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1900000000000000) [ 504.915080][ T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a00000000000000) 03:32:41 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0xa600, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004855}, 0x20040000) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x40000) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) splice(r4, 0x0, r5, 0x0, 0x1420000a7a, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000000)={0x7, [0x6ac, 0x8001, 0x4, 0xfd0a, 0x1000, 0x200, 0x4]}, 0x12) r6 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0) syz_usb_control_io(r6, 0x0, 0x0) syz_usb_control_io(r6, &(0x7f00000002c0)={0x2c, &(0x7f0000000140)={0x0, 0x0, 0x8, {0x8, 0x0, "33c8fd41c1e6"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_ep_write$ath9k_ep1(r6, 0x82, 0xf0, &(0x7f0000000180)={[{0xeb, 0x4e00, "6e1a1ca3feb01eaf6ad4c641e038ebfd508cd9fd84da2592e5fb60c1726423080adbd31633731e9fe9be2e423a619702a39108d3352927437ce2f3c93748d7e7fc024d77e423be75ce274c5e62c72a48afe2fb2d807c50ba9e795fb728a5ee34390b848969e1af604fbc308f3e457bf4c37dad75e489bb5909b2929b07f2449666c526689c75db03be8aa709ed95b48d011ebfbc2db084ad7d774e02f68f270911205088bc32d230c49e048a374bbdd1c1a41e36b30b5c12ccc8fedb44bceb71e5ac9b755afdc9f44194db93fb61bbd6b53fee870c89bd002cc6680dce1ee4fc2c0b23a4ea8d7f5e7061d8"}]}) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, @none, 0x8}, 0xa) ioctl$BLKSECDISCARD(r7, 0x127d, &(0x7f0000000140)) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) 03:32:41 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f0000000000)={0x1}) keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="757466383d312c6e6f6e756d7461696c3d302c696f636861727365743d63ff9870313235352c696f636861727365743d63"]) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140)) 03:32:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 505.150324][ T27] audit: type=1804 audit(1593747161.661:258): pid=22361 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/367/bus" dev="sda1" ino=16369 res=1 03:32:41 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, r3, 0x0, 0x0) 03:32:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b00000000000000) [ 505.294002][T22380] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 505.305702][T22370] FAT-fs (loop2): bogus number of reserved sectors [ 505.317049][T22370] FAT-fs (loop2): Can't find a valid FAT filesystem [ 505.404478][ T27] audit: type=1804 audit(1593747161.911:259): pid=22380 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/368/file0/bus" dev="loop0" ino=158 res=1 [ 505.495754][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 505.539524][ T12] usb 2-1: new high-speed USB device number 51 using dummy_hcd 03:32:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffff91}, 0x1c) 03:32:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c00000000000000) 03:32:42 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000580)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000fddbde250100000014000300fc020000000000000000000000000000050001000000000014000200fc01000000000000000000000000000108000400ac1414bb"], 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x2404c804) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffa) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000700)={0x0, r4, 0x8, 0x7ff, 0x81, 0x100}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x40) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r5, 0x40184152, &(0x7f00000004c0)={0x0, &(0x7f0000000480)=[&(0x7f0000000180)="a6411e4cd4998e861f74256ca23d6149c1e4d52121d456f9d9289fcbad5c76cf2027d85c237cc9991b434be0b1ad2da16aa143a16abb8c3b23767f602b8016968613677c3afac32abd52aa5588939d1e8c6a211ed505b82090d8e71e131abf18bac6f958cee45a3908822f2c338ca4cb1e0b16852260dcdc0f7f57cfaec1f9653846c8757be7bddfd611633a42ec77d230f8c78833abaa5e96fa1d7e631d4312cdafcb731f0c7461f61ef0c7bc47d2e95b9d2ceb48ac0847c2c404145c2c98c4a0ff8d12953f0464e6db8d77921b1e4f0b6bcd", &(0x7f0000000080)="4ef7a53468b969b894059d29da51b97c8475a08a1bf7aaa73ce75ffa3ce4559a6cfdacc8c8", &(0x7f00000000c0)="2d396686802df10c63474cb229483cab13c7982347fb3f440a6ef8158de43698782067af22da9fb3f2fc52af9c9b2ef5cd5575ce9c7fb6d2ff7e8adb0e0f7a934b15fb95b4760b2f93d16b5884e3f0218452cc87030d80369844753c7fa0d617af30", &(0x7f0000000280)="049dfe8af5469c863484dad72763946176761fa5623e1d6fa096aa3d59901bfafe81e09db47ed508491674cd50ed71186d1eb10613e91d0c1642f1aece9e44462ef81c344bf240a5b4906aabd697335dc2d05aec1aab5c7d330b3ebd4160aebc707a92862489be233427b46bfab3d40b03b0d7faca9f32efe001d6ed3af7ea8ce72dd48edbde6b478d4116bc6ea8a8eb424927a07f8d01fa5962a3", &(0x7f0000000340)="6f32218bbf351149204b4e97fe089abd298f0889d54a1ca7306bf74e6bcee980e9a08d2592a68a272f42664ca87dab353a6a53c975a26275d683f60112e4db7732c2c3bb15fccc686f613e076e8c5f222d43bc0f3175c551baa26fd9dff52b94eb", &(0x7f00000003c0)="0fbdb8b89aa922de376170150ec3bdd8f3f8631de5673391faa9f84e3cf084f33fb8c1a689fd204dc44ca8fbd4bd65ba0d1bc02bfd3533ca2d0b546454ee5367e2dbc465947394aadf103a39c0621c34b03cc424d95eb9ce4f82659d908b2ca62a93f59ddb88b0bfb009dc4d7734ded0576f95a3e18dd1f5211aa4407b4986ea6db6d0dc026c32cc78a81d32be73bf92d73225d6fbe9aaaa85298a1d731c0b4ebe89969e7ec8b6"], 0x79ef98fd}) r6 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xfffa) setsockopt$bt_l2cap_L2CAP_CONNINFO(r7, 0x6, 0x2, &(0x7f00000006c0)={0x3, "7bcbf4"}, 0x6) ioctl$BLKSECDISCARD(r6, 0x127d, &(0x7f0000000140)) 03:32:42 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, r3, 0x0, 0x0) 03:32:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d00000000000000) [ 505.759768][T22401] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 505.808732][ T12] usb 2-1: device descriptor read/64, error 18 03:32:42 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x139}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 505.880621][ T27] audit: type=1804 audit(1593747162.381:260): pid=22401 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/369/file0/bus" dev="loop0" ino=159 res=1 [ 505.965070][ T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 506.208803][ T12] usb 2-1: device descriptor read/64, error 18 [ 506.478730][ T12] usb 2-1: new high-speed USB device number 52 using dummy_hcd [ 506.758783][ T12] usb 2-1: device descriptor read/64, error 18 [ 507.148739][ T12] usb 2-1: device descriptor read/64, error 18 [ 507.269804][ T12] usb usb2-port1: attempt power cycle [ 507.978758][ T12] usb 2-1: new high-speed USB device number 53 using dummy_hcd 03:32:44 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00') writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4) keyctl$read(0xb, r5, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"}) sendfile(r1, r3, 0x0, 0x0) 03:32:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e00000000000000) 03:32:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:32:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffffc4}, 0x1c) 03:32:44 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000180)="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", {0x9, 0x5, 0xcd243842, 0x9, 0x400, 0x2, 0x3, 0x80000001}}) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)) 03:32:44 executing program 2: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) tkill(r3, 0x3c) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000140)) 03:32:44 executing program 2: keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)) [ 508.128793][ T12] usb 2-1: device descriptor read/8, error -71 03:32:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1f00000000000000) [ 508.180618][T22439] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 03:32:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000000000000) 03:32:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2100000000000000) 03:32:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0) [ 508.311762][T22439] ------------[ cut here ]------------ [ 508.339606][ T12] usb 2-1: device descriptor read/8, error -71 [ 508.340200][T22439] kernel BUG at fs/buffer.c:3032! [ 508.361064][T22439] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 508.367143][T22439] CPU: 1 PID: 22439 Comm: syz-executor.0 Not tainted 5.8.0-rc3-syzkaller #0 [ 508.375800][T22439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.385856][T22439] RIP: 0010:submit_bh_wbc+0x6b0/0x6d0 [ 508.391219][T22439] Code: ff 44 89 e1 80 e1 07 fe c1 38 c1 0f 8c 43 fc ff ff 4c 89 e7 e8 11 a5 e7 ff e9 36 fc ff ff e8 37 a6 a8 ff 0f 0b e8 30 a6 a8 ff <0f> 0b e8 29 a6 a8 ff 0f 0b e8 22 a6 a8 ff 0f 0b e8 1b a6 a8 ff 0f [ 508.410815][T22439] RSP: 0018:ffffc9000d45f8a8 EFLAGS: 00010287 [ 508.416871][T22439] RAX: ffffffff81cbd520 RBX: 0000000000000000 RCX: 0000000000040000 [ 508.424830][T22439] RDX: ffffc90001909000 RSI: 00000000000020ea RDI: 00000000000020eb [ 508.432815][T22439] RBP: 0000000000000800 R08: ffffffff81cbcf13 R09: ffffed100671faaf [ 508.440805][T22439] R10: ffffed100671faaf R11: 0000000000000000 R12: 0000000000000001 [ 508.448769][T22439] R13: ffff8880338fd570 R14: 0000000000000000 R15: dffffc0000000000 [ 508.456733][T22439] FS: 00007fe1c2401700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 508.465793][T22439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 508.472731][T22439] CR2: 00000000004e2330 CR3: 0000000088cf2000 CR4: 00000000001426e0 [ 508.480728][T22439] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 508.489650][T22439] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 508.497609][T22439] Call Trace: [ 508.500905][T22439] __sync_dirty_buffer+0x19b/0x2d0 [ 508.506027][T22439] __fat_write_inode+0x6f4/0x890 [ 508.510969][T22439] __writeback_single_inode+0x568/0x630 [ 508.516510][T22439] writeback_single_inode+0x1b1/0x7d0 [ 508.521878][T22439] ? lock_acquire+0x160/0x720 [ 508.526548][T22439] ? sync_mapping_buffers+0x5b0/0xde0 [ 508.531944][T22439] ? __generic_file_fsync+0x96/0x190 [ 508.537224][T22439] sync_inode_metadata+0x6d/0xb0 [ 508.542162][T22439] __generic_file_fsync+0x13c/0x190 [ 508.547354][T22439] fat_file_fsync+0x7a/0x190 [ 508.551949][T22439] generic_file_write_iter+0x599/0x650 [ 508.557409][T22439] do_iter_readv_writev+0x5b7/0x820 [ 508.562634][T22439] do_iter_write+0x16a/0x540 [ 508.567221][T22439] ? __sb_start_write+0x35f/0x410 [ 508.572266][T22439] do_writev+0x23f/0x4a0 [ 508.576504][T22439] ? _copy_to_user+0xca/0x140 [ 508.581177][T22439] ? rcu_read_lock_sched_held+0x2f/0xa0 [ 508.586719][T22439] ? lock_is_held_type+0x87/0xe0 [ 508.591654][T22439] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 508.597716][T22439] do_syscall_64+0x73/0xe0 [ 508.602132][T22439] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 508.608017][T22439] RIP: 0033:0x45cb29 [ 508.611895][T22439] Code: Bad RIP value. [ 508.615957][T22439] RSP: 002b:00007fe1c2400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 508.624358][T22439] RAX: ffffffffffffffda RBX: 000000000050eee0 RCX: 000000000045cb29 [ 508.632343][T22439] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000006 [ 508.640306][T22439] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 508.648268][T22439] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 03:32:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2200000000000000) [ 508.656240][T22439] R13: 0000000000000d62 R14: 00000000004cb843 R15: 00007fe1c24016d4 [ 508.664204][T22439] Modules linked in: [ 508.797087][T22439] ---[ end trace b4faaf20b1cafd54 ]--- [ 508.813559][T22439] RIP: 0010:submit_bh_wbc+0x6b0/0x6d0 [ 508.819982][T22439] Code: ff 44 89 e1 80 e1 07 fe c1 38 c1 0f 8c 43 fc ff ff 4c 89 e7 e8 11 a5 e7 ff e9 36 fc ff ff e8 37 a6 a8 ff 0f 0b e8 30 a6 a8 ff <0f> 0b e8 29 a6 a8 ff 0f 0b e8 22 a6 a8 ff 0f 0b e8 1b a6 a8 ff 0f [ 508.840597][T22439] RSP: 0018:ffffc9000d45f8a8 EFLAGS: 00010287 [ 508.846852][T22439] RAX: ffffffff81cbd520 RBX: 0000000000000000 RCX: 0000000000040000 [ 508.857015][T22439] RDX: ffffc90001909000 RSI: 00000000000020ea RDI: 00000000000020eb [ 508.865880][T22439] RBP: 0000000000000800 R08: ffffffff81cbcf13 R09: ffffed100671faaf [ 508.876164][T22439] R10: ffffed100671faaf R11: 0000000000000000 R12: 0000000000000001 [ 508.885053][T22439] R13: ffff8880338fd570 R14: 0000000000000000 R15: dffffc0000000000 [ 508.895266][T22439] FS: 00007fe1c2401700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 508.905026][T22439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 508.912669][T22439] CR2: 00007fcc0e1e1000 CR3: 0000000088cf2000 CR4: 00000000001426e0 [ 508.924751][T22439] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 508.933419][T22439] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 508.942484][T22439] Kernel panic - not syncing: Fatal exception [ 508.949578][T22439] Kernel Offset: disabled [ 508.953906][T22439] Rebooting in 86400 seconds..