[ 63.259644][ T26] audit: type=1800 audit(1573008536.048:27): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 63.281199][ T26] audit: type=1800 audit(1573008536.048:28): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 64.290925][ T26] audit: type=1800 audit(1573008537.168:29): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 64.311146][ T26] audit: type=1800 audit(1573008537.178:30): pid=7793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.12' (ECDSA) to the list of known hosts. 2019/11/06 02:49:06 fuzzer started 2019/11/06 02:49:08 dialing manager at 10.128.0.105:39303 2019/11/06 02:49:09 syscalls: 2553 2019/11/06 02:49:09 code coverage: enabled 2019/11/06 02:49:09 comparison tracing: enabled 2019/11/06 02:49:09 extra coverage: extra coverage is not supported by the kernel 2019/11/06 02:49:09 setuid sandbox: enabled 2019/11/06 02:49:09 namespace sandbox: enabled 2019/11/06 02:49:09 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 02:49:09 fault injection: enabled 2019/11/06 02:49:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 02:49:09 net packet injection: enabled 2019/11/06 02:49:09 net device setup: enabled 2019/11/06 02:49:09 concurrency sanitizer: enabled 2019/11/06 02:49:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/06 02:49:12 adding functions to KCSAN blacklist: 'find_next_bit' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'blk_mq_dispatch_rq_list' 'generic_permission' 'wbt_done' 'tomoyo_supervisor' 'vm_area_dup' 'generic_fillattr' 'ext4_free_inode' 'ktime_get_real_seconds' 'do_nanosleep' 'tcp_add_backlog' 'ext4_free_inodes_count' 'ext4_has_free_clusters' 'sit_tunnel_xmit' 'tick_sched_do_timer' '__hrtimer_run_queues' 'run_timer_softirq' 'tick_nohz_next_event' 'ep_poll' 'task_dump_owner' 'generic_write_end' 02:49:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB="c80100001300fbff00000000000000003d000000b40152001000300069645f7265736f6c7665720008004a00", @ANYRES32, @ANYBLOB="bc8b27c6e50452bae4c05eea0d862436d6a424375e8ee4581b3f8b1e0169812c7abf58a330a1ad23a18c85c00435ce607403b2105babfb44702aef79d0de05c359659fbc59ac264807d165a04653b24092fc05a8ebe73de7196514f56ed8dbd4b9d6ad2a0dd80d0690170ed60c31077adc95b43cc1e1d79c0c7f162b8033fb38e61c5b18325eabcaf5b298ff3bddeb705c3415c93e95643d4de4ee04003c00a4004b00dd36875305e70467ed49d33c2e1e59593192e6e8e090fa283aa26d5870c7dc127e9ca4ae373bdeda192a2ba653b8f733baad1469c405aec99ba25f9d43d75fd76cf65badb791743801af187993420cb1895db3f7a2d9c3707b24bcb794ab02c0bf58065ad9bef44e71a656f16473015ca8c48e9ae07f3d53204c484094e9b4c056aa755d8297a2fd07aa0d1ce5f7e3363220ded1b462dcbb11ebf99c8f33b221757ccd264ba978324d95610eb8f8b44c77f202000085d5eb0d553105510a448f80ef5da300714673895d4c436aae12185c88cb66980e908c19b2618b818d2bc1462f30102949557d9ace3d3430b9173fe4df6d5dff03a1425e9eea8af249ee1cabbec3038cf68711098a540551b718684ecb21f419c51fd52654ece1fa3257ae13a6994b5ca56e1d282318d4a4a88d"], 0x1c8}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924925b9, 0x0) 02:49:22 executing program 1: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) syzkaller login: [ 89.902566][ T7969] IPVS: ftp: loaded support on port[0] = 21 [ 90.000715][ T7969] chnl_net:caif_netlink_parms(): no params data found [ 90.063675][ T7969] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.085214][ T7969] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.104862][ T7969] device bridge_slave_0 entered promiscuous mode [ 90.112227][ T7969] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.122698][ T7969] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.131579][ T7969] device bridge_slave_1 entered promiscuous mode [ 90.151676][ T7972] IPVS: ftp: loaded support on port[0] = 21 02:49:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) [ 90.170446][ T7969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.192673][ T7969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.235027][ T7969] team0: Port device team_slave_0 added [ 90.253176][ T7969] team0: Port device team_slave_1 added [ 90.337900][ T7969] device hsr_slave_0 entered promiscuous mode [ 90.374738][ T7969] device hsr_slave_1 entered promiscuous mode [ 90.442223][ T7975] IPVS: ftp: loaded support on port[0] = 21 [ 90.472674][ T7972] chnl_net:caif_netlink_parms(): no params data found 02:49:23 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 90.552836][ T7969] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.559932][ T7969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.567252][ T7969] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.574288][ T7969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.711808][ T7972] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.735611][ T7972] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.743512][ T7972] device bridge_slave_0 entered promiscuous mode [ 90.799596][ T7972] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.815807][ T7972] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.844485][ T7972] device bridge_slave_1 entered promiscuous mode [ 90.873358][ T7969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.936538][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.956798][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.996202][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.025882][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 91.065891][ T7969] 8021q: adding VLAN 0 to HW filter on device team0 [ 91.120008][ T8001] IPVS: ftp: loaded support on port[0] = 21 [ 91.129379][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.155292][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.162433][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.207496][ T7972] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.278319][ T7972] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.326861][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.346395][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.375139][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.382213][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.414992][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.449426][ T7975] chnl_net:caif_netlink_parms(): no params data found 02:49:24 executing program 4: prctl$PR_GET_PDEATHSIG(0x25, &(0x7f0000000080)) [ 91.500404][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.528414][ T7972] team0: Port device team_slave_0 added [ 91.538699][ T7969] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 91.586282][ T7969] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.639686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.651149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.695334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.734952][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.775467][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.807205][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.847428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.875341][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.907567][ T7972] team0: Port device team_slave_1 added [ 91.949559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.967658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.995076][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.002541][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.061367][ T8006] IPVS: ftp: loaded support on port[0] = 21 [ 92.101027][ T7969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.140566][ T7975] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.154634][ T7975] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.181468][ T7975] device bridge_slave_0 entered promiscuous mode [ 92.244272][ T8001] chnl_net:caif_netlink_parms(): no params data found [ 92.280142][ T7975] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.295078][ T7975] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.324853][ T7975] device bridge_slave_1 entered promiscuous mode 02:49:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 92.407044][ T7972] device hsr_slave_0 entered promiscuous mode [ 92.454788][ T7972] device hsr_slave_1 entered promiscuous mode [ 92.496159][ T7972] debugfs: Directory 'hsr0' with parent '/' already present! [ 92.571012][ T7975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 92.583763][ T7975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 92.723185][ T7975] team0: Port device team_slave_0 added [ 92.762031][ T8021] IPVS: ftp: loaded support on port[0] = 21 [ 92.802422][ T8001] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.818452][ T8001] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.838011][ T8001] device bridge_slave_0 entered promiscuous mode [ 92.858928][ T7975] team0: Port device team_slave_1 added [ 92.894846][ T7972] 8021q: adding VLAN 0 to HW filter on device bond0 02:49:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB="c80100001300fbff00000000000000003d000000b40152001000300069645f7265736f6c7665720008004a00", @ANYRES32, @ANYBLOB="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"], 0x1c8}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924925b9, 0x0) [ 92.915651][ T8001] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.922868][ T8001] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.955371][ T8001] device bridge_slave_1 entered promiscuous mode [ 93.008499][ T7972] 8021q: adding VLAN 0 to HW filter on device team0 [ 93.072497][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.109009][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.150083][ T8006] chnl_net:caif_netlink_parms(): no params data found [ 93.186159][ T8001] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 02:49:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB="c80100001300fbff00000000000000003d000000b40152001000300069645f7265736f6c7665720008004a00", @ANYRES32, @ANYBLOB="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"], 0x1c8}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924925b9, 0x0) [ 93.256882][ T7975] device hsr_slave_0 entered promiscuous mode [ 93.324813][ T7975] device hsr_slave_1 entered promiscuous mode [ 93.364456][ T7975] debugfs: Directory 'hsr0' with parent '/' already present! [ 93.378904][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.395315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.428245][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.435423][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.475025][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.507955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.528134][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.535210][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.568343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 93.588671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 93.620109][ T7972] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.667183][ T7972] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 93.708062][ T8001] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.819071][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.845324][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 02:49:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB="c80100001300fbff00000000000000003d000000b40152001000300069645f7265736f6c7665720008004a00", @ANYRES32, @ANYBLOB="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"], 0x1c8}, 0x1, 0x68}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x10) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924925b9, 0x0) [ 93.887993][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 93.952821][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 93.993344][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 94.028739][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.071010][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.115334][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.147903][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.188642][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 94.215473][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 94.264043][ T8001] team0: Port device team_slave_0 added [ 94.351588][ T8001] team0: Port device team_slave_1 added [ 94.365056][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 94.372532][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 02:49:27 executing program 0: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18}], 0x18}], 0x146, 0x0) [ 94.434883][ T8006] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.441967][ T8006] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.529200][ T8006] device bridge_slave_0 entered promiscuous mode [ 94.691180][ T7972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 94.728204][ T8006] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.735839][ T8006] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.794556][ T8006] device bridge_slave_1 entered promiscuous mode [ 94.950150][ T8001] device hsr_slave_0 entered promiscuous mode [ 94.994957][ T8001] device hsr_slave_1 entered promiscuous mode [ 95.027432][ T8001] debugfs: Directory 'hsr0' with parent '/' already present! [ 95.055969][ T8021] chnl_net:caif_netlink_parms(): no params data found 02:49:28 executing program 0: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18}], 0x18}], 0x146, 0x0) [ 95.106247][ T8006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.213803][ T7975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.287914][ T8006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 95.345877][ C0] hrtimer: interrupt took 25631 ns [ 95.366911][ T7975] 8021q: adding VLAN 0 to HW filter on device team0 [ 95.452248][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 95.471493][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.530950][ T8099] bridge0: port 3(gretap0) entered blocking state [ 95.559745][ T8099] bridge0: port 3(gretap0) entered disabled state [ 95.629115][ T8099] device gretap0 entered promiscuous mode [ 95.669782][ T8099] bridge0: port 3(gretap0) entered blocking state [ 95.676570][ T8099] bridge0: port 3(gretap0) entered forwarding state [ 95.796842][ T8108] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 02:49:28 executing program 0: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18}], 0x18}], 0x146, 0x0) [ 95.918672][ T8021] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.984439][ T8021] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.992442][ T8021] device bridge_slave_0 entered promiscuous mode [ 96.031935][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.048443][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.099184][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.106337][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.186328][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.230475][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.276516][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.283596][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state 02:49:29 executing program 0: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18}], 0x18}], 0x146, 0x0) [ 96.368497][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 96.430651][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 96.508855][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.562159][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.625401][ T8006] team0: Port device team_slave_0 added 02:49:29 executing program 1: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="afda8f976352d83ae67c093dd154ac0c86ab570c896f30bdfcb7def634a0e53f2241f59d81888fa42d976ae44c77000142896bca3128b445a74f915506df2dde3688833a8988081b710a6c3d2ca54a49e57da8ef042d968373bcea3f8db77dd8c3c05616fd6f9c65e2f9be6eb52107c1b0cb801d8616818944f8c68c4fefc60e51eda69f5deca02bea80a26b2f3a28dc0b4b7f8c702d5b1517031175242c72edcdf586649ffb8819a7896d90f490a1ceeef54718e818cb36a6723a522e856814b91416b8f5195d9296ba3c095a2f93f92b2755a0fb69c3b6309717a8828b7a1adfa23a1594a783d64318916e8209e1e73007005e42c4c100000000000000000000000000000000788cc241223de1caee3510959fe74abe5162657c6f8d1241843607958e07422bed9fd636eb131fd89a404bc214b1f2d51375fccd780bac05feec2676ba3523b9059bf185a49aa0c96bca0a63e5a64e16b087240eab20216c76c92d10a9b53e6f7f8b1a8b6f7c6aaf5da4bde360e4b8cd8e9de37d86092793517a95097858b40696e92d95831579c70e9adb11cf46241cd4d49e53fb73cb060317910f62e196b98b6d9e9d346f02e76c3d5cba1f5ab4710f5026416d505069b18ba2d3db8d9b174826b97db51e9118cb092a41be0f12563f7a3434d579f33c7cf3b1000000000000000000000000000000009e577de5102f0aad6a9c3888deea5facd33fed8a4496bcee488c9b5b124346c0f30fd73679d290f8af7388f42407829f475a2b73bf2e506d01245f8d26cb12029565838e1107cc06fefa14b8d3f51e68ead9d0bc79f0ba3539d96fa6bef3c4c51260206fdafb0d474fc1075d9155207e7653000000000000000000dc2838ac731fe291ff4527460c3fe22c9ecabac11ec704d731c29296f0c3ae98b4de3e2f19457f240a206251fbf1a06a50000000000000"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 96.678339][ T8021] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.704468][ T8021] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.794473][ T8021] device bridge_slave_1 entered promiscuous mode [ 96.808306][ T7975] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 96.864396][ T7975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 96.924226][ T8006] team0: Port device team_slave_1 added [ 96.933683][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.948801][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 96.989316][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 97.026851][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 97.077843][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.125250][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.174144][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.202683][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.235392][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 97.311070][ T8142] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 97.372522][ T7975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 97.426911][ T8006] device hsr_slave_0 entered promiscuous mode [ 97.465017][ T8006] device hsr_slave_1 entered promiscuous mode [ 97.514599][ T8006] debugfs: Directory 'hsr0' with parent '/' already present! [ 97.554795][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 97.562329][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 97.606537][ T8021] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 97.630805][ T8001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.668164][ T8021] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.737330][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.758780][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.807045][ T8001] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.815465][ T8021] team0: Port device team_slave_0 added [ 97.860181][ T8021] team0: Port device team_slave_1 added [ 97.995459][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.004345][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.062726][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.069818][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.141072][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.181940][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.235014][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.242097][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state 02:49:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) [ 98.312842][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 98.456584][ T8021] device hsr_slave_0 entered promiscuous mode [ 98.494818][ T8021] device hsr_slave_1 entered promiscuous mode [ 98.528661][ T8021] debugfs: Directory 'hsr0' with parent '/' already present! [ 98.566228][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.584571][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 98.593805][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 98.645249][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 98.654050][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 98.675614][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 98.720943][ T8001] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 98.754414][ T8001] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 98.816479][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 98.845834][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.892033][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.933011][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.978503][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.031686][ T8006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.063594][ T8001] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.111455][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 99.149400][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 99.209275][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 99.241870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.254997][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.264310][ T8006] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.397703][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.406874][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.454897][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.461969][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.515022][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.523780][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.584776][ T7998] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.591892][ T7998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.635015][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 99.665529][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 99.694670][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 99.703397][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.735578][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.743573][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 99.793886][ T8006] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 99.834413][ T8006] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 99.872550][ T8021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.920029][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.935579][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.964827][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.973351][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.005517][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.015160][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.055638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.074488][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.082045][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.119410][ T8021] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.169094][ T8006] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.180128][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.195365][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.272009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.293332][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.344838][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.351900][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.384930][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.393658][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.393779][ T8214] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 100.415854][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.422927][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.433899][ T8214] FAT-fs (loop3): Filesystem has been set read-only [ 100.447582][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.451967][ T8214] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 100.464173][ T8214] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 100.467010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.477608][ T8214] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 100.492820][ T8213] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 100.606451][ T8021] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 100.685247][ T8021] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 02:49:33 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 100.754680][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.763005][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.835260][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.875031][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.883830][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.971301][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.012820][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.055377][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.108273][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.182195][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.229376][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.267487][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.318087][ T8122] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.373504][ T8021] 8021q: adding VLAN 0 to HW filter on device batadv0 02:49:34 executing program 4: prctl$PR_GET_PDEATHSIG(0x25, &(0x7f0000000080)) 02:49:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:35 executing program 0: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) 02:49:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) 02:49:35 executing program 1: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) 02:49:35 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:35 executing program 4: prctl$PR_GET_PDEATHSIG(0x25, &(0x7f0000000080)) [ 102.455048][ T8276] bridge0: port 3(gretap0) entered blocking state [ 102.469382][ T8276] bridge0: port 3(gretap0) entered disabled state 02:49:35 executing program 4: prctl$PR_GET_PDEATHSIG(0x25, &(0x7f0000000080)) 02:49:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 102.553470][ T8267] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 102.580348][ T8267] FAT-fs (loop3): Filesystem has been set read-only [ 102.584623][ T8276] device gretap0 entered promiscuous mode [ 102.605859][ T8267] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 102.626550][ T8276] bridge0: port 3(gretap0) entered blocking state [ 102.633250][ T8276] bridge0: port 3(gretap0) entered forwarding state [ 102.655218][ T8267] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 102.680975][ T8267] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 02:49:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) [ 102.701577][ T8279] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 02:49:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 102.795383][ T8280] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 102.818500][ T8265] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 02:49:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:35 executing program 1: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) 02:49:35 executing program 0: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) 02:49:35 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 103.270834][ T8298] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 103.367684][ T8304] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 02:49:36 executing program 0: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 103.491703][ T8306] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 103.538000][ T8306] FAT-fs (loop3): Filesystem has been set read-only 02:49:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 103.578804][ T8306] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 02:49:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 103.867863][ T8325] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 02:49:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:37 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) 02:49:38 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 105.451868][ T8372] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 02:49:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) r0 = bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000340)={0x9, 0x7, 0x7, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x298) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2288, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002140)={r0, 0x0, &(0x7f0000001140)=""/4096}, 0x20) [ 105.554603][ T8372] FAT-fs (loop2): Filesystem has been set read-only [ 105.589280][ T8372] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 02:49:38 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 105.773074][ T8371] FAT-fs (loop2): error, invalid access to FAT (entry 0x00000500) 02:49:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:38 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:39 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 106.491951][ T8432] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 02:49:39 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 106.608195][ T8432] FAT-fs (loop3): Filesystem has been set read-only [ 106.625030][ T8432] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 106.754002][ T8410] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 106.933143][ T8437] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) 02:49:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) [ 107.011644][ T8437] FAT-fs (loop5): Filesystem has been set read-only [ 107.050811][ T8437] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) 02:49:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:40 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:40 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:41 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:41 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) 02:49:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) 02:49:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) [ 109.331824][ T8503] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 109.353992][ T8503] FAT-fs (loop5): Filesystem has been set read-only 02:49:42 executing program 3: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="afda8f976352d83ae67c093dd154ac0c86ab570c896f30bdfcb7def634a0e53f2241f59d81888fa42d976ae44c77000142896bca3128b445a74f915506df2dde3688833a8988081b710a6c3d2ca54a49e57da8ef042d968373bcea3f8db77dd8c3c05616fd6f9c65e2f9be6eb52107c1b0cb801d8616818944f8c68c4fefc60e51eda69f5deca02bea80a26b2f3a28dc0b4b7f8c702d5b1517031175242c72edcdf586649ffb8819a7896d90f490a1ceeef54718e818cb36a6723a522e856814b91416b8f5195d9296ba3c095a2f93f92b2755a0fb69c3b6309717a8828b7a1adfa23a1594a783d64318916e8209e1e73007005e42c4c100000000000000000000000000000000788cc241223de1caee3510959fe74abe5162657c6f8d1241843607958e07422bed9fd636eb131fd89a404bc214b1f2d51375fccd780bac05feec2676ba3523b9059bf185a49aa0c96bca0a63e5a64e16b087240eab20216c76c92d10a9b53e6f7f8b1a8b6f7c6aaf5da4bde360e4b8cd8e9de37d86092793517a95097858b40696e92d95831579c70e9adb11cf46241cd4d49e53fb73cb060317910f62e196b98b6d9e9d346f02e76c3d5cba1f5ab4710f5026416d505069b18ba2d3db8d9b174826b97db51e9118cb092a41be0f12563f7a3434d579f33c7cf3b1000000000000000000000000000000009e577de5102f0aad6a9c3888deea5facd33fed8a4496bcee488c9b5b124346c0f30fd73679d290f8af7388f42407829f475a2b73bf2e506d01245f8d26cb12029565838e1107cc06fefa14b8d3f51e68ead9d0bc79f0ba3539d96fa6bef3c4c51260206fdafb0d474fc1075d9155207e7653000000000000000000dc2838ac731fe291ff4527460c3fe22c9ecabac11ec704d731c29296f0c3ae98b4de3e2f19457f240a206251fbf1a06a50000000000000"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 109.385026][ T8503] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) [ 109.433715][ T8503] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) [ 109.517460][ T8503] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) 02:49:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) [ 109.613789][ T8502] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) [ 109.648999][ T8523] bridge0: port 3(gretap0) entered blocking state [ 109.683861][ T8523] bridge0: port 3(gretap0) entered disabled state 02:49:42 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) 02:49:42 executing program 0: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="afda8f976352d83ae67c093dd154ac0c86ab570c896f30bdfcb7def634a0e53f2241f59d81888fa42d976ae44c77000142896bca3128b445a74f915506df2dde3688833a8988081b710a6c3d2ca54a49e57da8ef042d968373bcea3f8db77dd8c3c05616fd6f9c65e2f9be6eb52107c1b0cb801d8616818944f8c68c4fefc60e51eda69f5deca02bea80a26b2f3a28dc0b4b7f8c702d5b1517031175242c72edcdf586649ffb8819a7896d90f490a1ceeef54718e818cb36a6723a522e856814b91416b8f5195d9296ba3c095a2f93f92b2755a0fb69c3b6309717a8828b7a1adfa23a1594a783d64318916e8209e1e73007005e42c4c100000000000000000000000000000000788cc241223de1caee3510959fe74abe5162657c6f8d1241843607958e07422bed9fd636eb131fd89a404bc214b1f2d51375fccd780bac05feec2676ba3523b9059bf185a49aa0c96bca0a63e5a64e16b087240eab20216c76c92d10a9b53e6f7f8b1a8b6f7c6aaf5da4bde360e4b8cd8e9de37d86092793517a95097858b40696e92d95831579c70e9adb11cf46241cd4d49e53fb73cb060317910f62e196b98b6d9e9d346f02e76c3d5cba1f5ab4710f5026416d505069b18ba2d3db8d9b174826b97db51e9118cb092a41be0f12563f7a3434d579f33c7cf3b1000000000000000000000000000000009e577de5102f0aad6a9c3888deea5facd33fed8a4496bcee488c9b5b124346c0f30fd73679d290f8af7388f42407829f475a2b73bf2e506d01245f8d26cb12029565838e1107cc06fefa14b8d3f51e68ead9d0bc79f0ba3539d96fa6bef3c4c51260206fdafb0d474fc1075d9155207e7653000000000000000000dc2838ac731fe291ff4527460c3fe22c9ecabac11ec704d731c29296f0c3ae98b4de3e2f19457f240a206251fbf1a06a50000000000000"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 109.749985][ T8523] device gretap0 entered promiscuous mode [ 109.794008][ T8523] bridge0: port 3(gretap0) entered blocking state [ 109.800660][ T8523] bridge0: port 3(gretap0) entered forwarding state [ 109.827835][ T8526] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfd80) 02:49:42 executing program 3: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) 02:49:43 executing program 4: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 110.201590][ T8545] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 110.202844][ T8530] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) 02:49:43 executing program 2: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 110.258794][ T8530] FAT-fs (loop5): Filesystem has been set read-only [ 110.278887][ T8530] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) 02:49:43 executing program 0: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 110.309068][ T8547] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 110.424065][ T8552] bridge0: port 3(gretap0) entered blocking state 02:49:43 executing program 1: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 110.478347][ T8552] bridge0: port 3(gretap0) entered disabled state 02:49:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="bcef6376150001000004000010006b2fe0cc7ba626ab55a14f42ff858272a3203611c611ebfe9c0a91a6"], 0x2a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket(0x10, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000000)) 02:49:43 executing program 3: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x436c7d688a5fceb0) r2 = add_key$user(&(0x7f0000000940)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002000)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5b0100000000000000ae89ba29", 0x1a, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r4) socket$inet6(0xa, 0x80001, 0x1ff) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) listen(r6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x80000040, 0x9, 0x1f, 0x7ff, 0x10001, 0x0, 0x7d, 0xfffffffffffffff7, 0xfffffffffffffffd}, 0xfffffffffffffdce) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001d40)=ANY=[@ANYBLOB="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"]], 0x8}}, 0xfffffffffffffff9) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="2c0000002000290f0000fa2cdd987700020000009500290000000001acf2fbd06c5362a7e91b166997e147e6e7b66a2839ff51b1972084d278520d9879d932a60a350d16ea190fd8aa31bf97bdd04b174a535481c9bdeca4c22fcf4022b3f89918efd1038836e8a68b21d1ac49720fa33a14565935d81ed51a75b99efdc6f00d0722593ea1d6351261da17942df2a1d02912417624a041545b715043f30a1c64d4fc852b9f38895442ea999fd7a5f9ade2d67f29b1e026d004855558af89075b1222b64624f5783040630b4b856a2843ea76098de2308faf9ae1780e7b251e089e9c0bda8a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) [ 110.562489][ T8552] device gretap0 entered promiscuous mode [ 110.582225][ T8552] bridge0: port 3(gretap0) entered blocking state [ 110.588953][ T8552] bridge0: port 3(gretap0) entered forwarding state [ 110.601678][ T8553] bridge0: port 3(gretap0) entered blocking state [ 110.652791][ T8553] bridge0: port 3(gretap0) entered disabled state [ 110.741739][ T8561] ================================================================== [ 110.747773][ T8553] device gretap0 entered promiscuous mode [ 110.749890][ T8561] BUG: KCSAN: data-race in wbt_issue / wbt_issue [ 110.749894][ T8561] [ 110.749981][ T8561] read to 0xffff88812af25828 of 8 bytes by task 2492 on cpu 0: [ 110.765991][ T8553] bridge0: port 3(gretap0) entered blocking state [ 110.771878][ T8561] wbt_issue+0x8e/0xf0 [ 110.771902][ T8561] __rq_qos_issue+0x4a/0x80 [ 110.771922][ T8561] blk_mq_start_request+0x32a/0x370 [ 110.771946][ T8561] loop_queue_rq+0x64/0x2b0 [ 110.771964][ T8561] blk_mq_dispatch_rq_list+0xbe9/0xe40 [ 110.771995][ T8561] blk_mq_do_dispatch_sched+0x11d/0x260 [ 110.778641][ T8553] bridge0: port 3(gretap0) entered forwarding state [ 110.782541][ T8561] blk_mq_sched_dispatch_requests+0x2b4/0x380 [ 110.782559][ T8561] __blk_mq_run_hw_queue+0xb7/0x160 [ 110.782576][ T8561] blk_mq_run_work_fn+0x57/0x70 [ 110.782613][ T8561] process_one_work+0x3d4/0x890 [ 110.798784][ T8555] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 110.802397][ T8561] worker_thread+0xa0/0x800 [ 110.802432][ T8561] kthread+0x1d4/0x200 [ 110.837836][ T8571] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 110.844720][ T8561] ret_from_fork+0x1f/0x30 [ 110.844724][ T8561] [ 110.844742][ T8561] write to 0xffff88812af25828 of 8 bytes by task 8561 on cpu 1: [ 110.844766][ T8561] wbt_issue+0xd0/0xf0 [ 110.844787][ T8561] __rq_qos_issue+0x4a/0x80 [ 110.844814][ T8561] blk_mq_start_request+0x32a/0x370 [ 110.890791][ T8561] loop_queue_rq+0x64/0x2b0 [ 110.895306][ T8561] blk_mq_dispatch_rq_list+0xbe9/0xe40 [ 110.900781][ T8561] blk_mq_do_dispatch_sched+0x11d/0x260 [ 110.906341][ T8561] blk_mq_sched_dispatch_requests+0x2b4/0x380 [ 110.912421][ T8561] __blk_mq_run_hw_queue+0xb7/0x160 [ 110.917629][ T8561] __blk_mq_delay_run_hw_queue+0x31b/0x3a0 [ 110.923536][ T8561] blk_mq_run_hw_queue+0x103/0x1c0 [ 110.928659][ T8561] blk_mq_sched_insert_requests+0x1ca/0x2e0 [ 110.934561][ T8561] blk_mq_flush_plug_list+0x572/0x6c0 [ 110.939941][ T8561] blk_flush_plug_list+0x271/0x2a0 [ 110.945060][ T8561] blk_finish_plug+0x60/0x84 [ 110.949661][ T8561] read_pages+0xbc/0x2d0 [ 110.953912][ T8561] __do_page_cache_readahead+0x353/0x390 [ 110.959556][ T8561] force_page_cache_readahead+0x13a/0x1f0 [ 110.965277][ T8561] page_cache_sync_readahead+0x1cf/0x1e0 [ 110.970913][ T8561] generic_file_read_iter+0xeb6/0x1440 [ 110.976388][ T8561] blkdev_read_iter+0xb2/0xe0 [ 110.981078][ T8561] new_sync_read+0x389/0x4f0 [ 110.985702][ T8561] __vfs_read+0xb1/0xc0 [ 110.989863][ T8561] vfs_read+0x143/0x2c0 [ 110.994029][ T8561] ksys_read+0xd5/0x1b0 [ 110.998197][ T8561] __x64_sys_read+0x4c/0x60 [ 111.002716][ T8561] do_syscall_64+0xcc/0x370 [ 111.007802][ T8561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.013688][ T8561] [ 111.016010][ T8561] Reported by Kernel Concurrency Sanitizer on: [ 111.022172][ T8561] CPU: 1 PID: 8561 Comm: blkid Not tainted 5.4.0-rc6+ #0 [ 111.029192][ T8561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.039248][ T8561] ================================================================== [ 111.047309][ T8561] Kernel panic - not syncing: panic_on_warn set ... [ 111.053904][ T8561] CPU: 1 PID: 8561 Comm: blkid Not tainted 5.4.0-rc6+ #0 [ 111.060921][ T8561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.070970][ T8561] Call Trace: [ 111.074284][ T8561] dump_stack+0xf5/0x159 [ 111.078553][ T8561] panic+0x210/0x640 [ 111.082457][ T8561] ? vprintk_func+0x8d/0x140 [ 111.087065][ T8561] kcsan_report.cold+0xc/0xe [ 111.091670][ T8561] kcsan_setup_watchpoint+0x3fe/0x410 [ 111.097058][ T8561] __tsan_unaligned_write8+0x143/0x1f0 [ 111.102534][ T8561] wbt_issue+0xd0/0xf0 [ 111.106616][ T8561] ? wbt_wait+0x250/0x250 [ 111.110955][ T8561] __rq_qos_issue+0x4a/0x80 [ 111.115473][ T8561] blk_mq_start_request+0x32a/0x370 [ 111.120689][ T8561] loop_queue_rq+0x64/0x2b0 [ 111.125218][ T8561] blk_mq_dispatch_rq_list+0xbe9/0xe40 [ 111.130695][ T8561] ? _raw_spin_unlock+0x4b/0x60 [ 111.135591][ T8561] blk_mq_do_dispatch_sched+0x11d/0x260 [ 111.141163][ T8561] blk_mq_sched_dispatch_requests+0x2b4/0x380 [ 111.147249][ T8561] __blk_mq_run_hw_queue+0xb7/0x160 [ 111.152466][ T8561] __blk_mq_delay_run_hw_queue+0x31b/0x3a0 [ 111.158293][ T8561] blk_mq_run_hw_queue+0x103/0x1c0 [ 111.163417][ T8561] ? dd_merged_requests+0x250/0x250 [ 111.168633][ T8561] blk_mq_sched_insert_requests+0x1ca/0x2e0 [ 111.174545][ T8561] blk_mq_flush_plug_list+0x572/0x6c0 [ 111.179944][ T8561] blk_flush_plug_list+0x271/0x2a0 [ 111.185070][ T8561] ? __read_once_size+0x41/0xe0 [ 111.189930][ T8561] blk_finish_plug+0x60/0x84 [ 111.194533][ T8561] ? blkdev_write_begin+0x60/0x60 [ 111.199572][ T8561] read_pages+0xbc/0x2d0 [ 111.203829][ T8561] ? 0xffffffff81000000 [ 111.207995][ T8561] __do_page_cache_readahead+0x353/0x390 [ 111.213661][ T8561] force_page_cache_readahead+0x13a/0x1f0 [ 111.219399][ T8561] page_cache_sync_readahead+0x1cf/0x1e0 [ 111.225071][ T8561] generic_file_read_iter+0xeb6/0x1440 [ 111.230573][ T8561] blkdev_read_iter+0xb2/0xe0 [ 111.235266][ T8561] new_sync_read+0x389/0x4f0 [ 111.239889][ T8561] __vfs_read+0xb1/0xc0 [ 111.244057][ T8561] vfs_read+0x143/0x2c0 [ 111.248226][ T8561] ksys_read+0xd5/0x1b0 [ 111.252398][ T8561] __x64_sys_read+0x4c/0x60 [ 111.256923][ T8561] do_syscall_64+0xcc/0x370 [ 111.261447][ T8561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.267395][ T8561] RIP: 0033:0x7f822b20e310 [ 111.271835][ T8561] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 111.291451][ T8561] RSP: 002b:00007ffe7a8c3948 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 111.299872][ T8561] RAX: ffffffffffffffda RBX: 000000000002e000 RCX: 00007f822b20e310 [ 111.307860][ T8561] RDX: 0000000000000029 RSI: 00000000009bae68 RDI: 0000000000000003 [ 111.315841][ T8561] RBP: 00000000009bae40 R08: 0000000000000058 R09: 0101010101010101 [ 111.323818][ T8561] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009b5030 [ 111.331799][ T8561] R13: 0000000000000029 R14: 00000000009b5080 R15: 00000000009bae58 [ 111.341110][ T8561] Kernel Offset: disabled [ 111.345466][ T8561] Rebooting in 86400 seconds..