[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.244' (ECDSA) to the list of known hosts. 2020/10/20 01:05:35 fuzzer started 2020/10/20 01:05:35 dialing manager at 10.128.0.26:38919 2020/10/20 01:05:35 syscalls: 3450 2020/10/20 01:05:35 code coverage: enabled 2020/10/20 01:05:35 comparison tracing: enabled 2020/10/20 01:05:35 extra coverage: enabled 2020/10/20 01:05:35 setuid sandbox: enabled 2020/10/20 01:05:35 namespace sandbox: enabled 2020/10/20 01:05:35 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/20 01:05:35 fault injection: enabled 2020/10/20 01:05:35 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/20 01:05:35 net packet injection: enabled 2020/10/20 01:05:35 net device setup: enabled 2020/10/20 01:05:35 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/20 01:05:35 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/20 01:05:35 USB emulation: enabled 2020/10/20 01:05:35 hci packet injection: enabled 2020/10/20 01:05:35 wifi device emulation: enabled 01:07:37 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x4}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 01:07:37 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "50a102", 0x10, 0x11, 0x0, @dev, @local, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 01:07:37 executing program 3: syz_emit_ethernet(0x83, &(0x7f0000000000)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "50a102", 0x4d, 0x6, 0x0, @dev, @mcast2, {[], {0x0, 0x0, 0x4d, 0x0, @opaque="32f552eb9af9d378a5f660c41e7e9277c19f40a6230184fb5f83e22af1a5279a60c558fd5ee3f6f5bb517d1c77d290e38ffb3d185d81aa844ce54eecbe3de3339303d4418f"}}}}}}, 0x0) 01:07:38 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000640)={0x2, 0x0, [{0x0, 0xf0, &(0x7f0000000080)=""/240}, {0x0, 0x35, &(0x7f0000000180)=""/53}]}) 01:07:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x20, 0x0, 0x1}, 0x40) syzkaller login: [ 192.367612][ T6895] IPVS: ftp: loaded support on port[0] = 21 [ 192.672552][ T6897] IPVS: ftp: loaded support on port[0] = 21 [ 192.712232][ T6895] chnl_net:caif_netlink_parms(): no params data found [ 192.917238][ T6899] IPVS: ftp: loaded support on port[0] = 21 [ 193.142820][ T6897] chnl_net:caif_netlink_parms(): no params data found [ 193.275708][ T6895] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.316654][ T6895] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.324660][ T6895] device bridge_slave_0 entered promiscuous mode [ 193.335291][ T6901] IPVS: ftp: loaded support on port[0] = 21 [ 193.385321][ T6903] IPVS: ftp: loaded support on port[0] = 21 [ 193.421636][ T6895] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.432391][ T6895] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.441002][ T6895] device bridge_slave_1 entered promiscuous mode [ 193.458896][ T6897] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.466212][ T6897] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.474586][ T6897] device bridge_slave_0 entered promiscuous mode [ 193.485389][ T6897] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.493589][ T6897] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.501826][ T6897] device bridge_slave_1 entered promiscuous mode [ 193.538205][ T6897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.554876][ T6897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.603035][ T6897] team0: Port device team_slave_0 added [ 193.611534][ T6895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.638610][ T6897] team0: Port device team_slave_1 added [ 193.645902][ T6895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.700629][ T6895] team0: Port device team_slave_0 added [ 193.734894][ T6895] team0: Port device team_slave_1 added [ 193.779093][ T6897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.789932][ T6897] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.819279][ T6897] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.882163][ T6897] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.889375][ T6897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.917024][ T6897] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.949982][ T6895] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.957379][ T6895] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.983962][ T6895] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.114712][ T6895] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.130791][ T6895] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.158148][ T6895] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.189496][ T6899] chnl_net:caif_netlink_parms(): no params data found [ 194.203140][ T7058] IPVS: ftp: loaded support on port[0] = 21 [ 194.259514][ T6895] device hsr_slave_0 entered promiscuous mode [ 194.268326][ T6895] device hsr_slave_1 entered promiscuous mode [ 194.297775][ T6897] device hsr_slave_0 entered promiscuous mode [ 194.305785][ T6897] device hsr_slave_1 entered promiscuous mode [ 194.314461][ T6897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.322854][ T6897] Cannot create hsr debugfs directory [ 194.358854][ T5] Bluetooth: hci0: command 0x0409 tx timeout [ 194.454262][ T6903] chnl_net:caif_netlink_parms(): no params data found [ 194.570708][ T6899] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.579287][ T6899] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.588655][ T6899] device bridge_slave_0 entered promiscuous mode [ 194.603328][ T5] Bluetooth: hci1: command 0x0409 tx timeout [ 194.624500][ T6901] chnl_net:caif_netlink_parms(): no params data found [ 194.642424][ T6899] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.650403][ T6899] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.659204][ T6899] device bridge_slave_1 entered promiscuous mode [ 194.777739][ T6899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.824479][ T6899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.836204][ T7261] Bluetooth: hci2: command 0x0409 tx timeout [ 194.896809][ T6903] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.903898][ T6903] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.913817][ T6903] device bridge_slave_0 entered promiscuous mode [ 194.956968][ T6903] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.974435][ T6903] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.984174][ T6903] device bridge_slave_1 entered promiscuous mode [ 195.015800][ T6903] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.031797][ T6901] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.040066][ T6901] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.048592][ T6901] device bridge_slave_0 entered promiscuous mode [ 195.059130][ T6899] team0: Port device team_slave_0 added [ 195.065266][ T6901] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.074056][ T6901] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.086128][ T3024] Bluetooth: hci3: command 0x0409 tx timeout [ 195.091346][ T6901] device bridge_slave_1 entered promiscuous mode [ 195.110608][ T6903] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.138484][ T6899] team0: Port device team_slave_1 added [ 195.174547][ T6901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.193686][ T6901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.218200][ T6903] team0: Port device team_slave_0 added [ 195.280470][ T6903] team0: Port device team_slave_1 added [ 195.307582][ T6899] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.314563][ T6899] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.340701][ T5] Bluetooth: hci4: command 0x0409 tx timeout [ 195.346860][ T6899] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.409341][ T6899] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.421427][ T6899] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.453309][ T6899] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.467927][ T6901] team0: Port device team_slave_0 added [ 195.479381][ T6903] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.486954][ T6903] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.513795][ T6903] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.525939][ T6895] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 195.547093][ T6901] team0: Port device team_slave_1 added [ 195.558255][ T6903] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.565218][ T6903] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.594701][ T6903] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.618575][ T7058] chnl_net:caif_netlink_parms(): no params data found [ 195.634127][ T6895] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 195.702340][ T6901] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.710707][ T6901] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.740150][ T6901] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.775702][ T6895] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 195.788879][ T6899] device hsr_slave_0 entered promiscuous mode [ 195.797078][ T6899] device hsr_slave_1 entered promiscuous mode [ 195.804429][ T6899] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.813427][ T6899] Cannot create hsr debugfs directory [ 195.824367][ T6903] device hsr_slave_0 entered promiscuous mode [ 195.831748][ T6903] device hsr_slave_1 entered promiscuous mode [ 195.838544][ T6903] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.846425][ T6903] Cannot create hsr debugfs directory [ 195.857791][ T6901] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.864754][ T6901] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.891965][ T6901] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.911581][ T6895] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 196.021682][ T6897] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 196.044928][ T6901] device hsr_slave_0 entered promiscuous mode [ 196.047988][ T3024] Bluetooth: hci5: command 0x0409 tx timeout [ 196.060711][ T6901] device hsr_slave_1 entered promiscuous mode [ 196.067641][ T6901] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 196.075189][ T6901] Cannot create hsr debugfs directory [ 196.102815][ T6897] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 196.158919][ T6897] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 196.183528][ T6897] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 196.195895][ T7058] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.214797][ T7058] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.223629][ T7058] device bridge_slave_0 entered promiscuous mode [ 196.235201][ T7058] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.242788][ T7058] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.251641][ T7058] device bridge_slave_1 entered promiscuous mode [ 196.398286][ T7058] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.443185][ T5] Bluetooth: hci0: command 0x041b tx timeout [ 196.458011][ T7058] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.522004][ T7058] team0: Port device team_slave_0 added [ 196.567990][ T7058] team0: Port device team_slave_1 added [ 196.675095][ T7058] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.682433][ T5] Bluetooth: hci1: command 0x041b tx timeout [ 196.693250][ T7058] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.720448][ T7058] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.733419][ T6899] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 196.781939][ T7058] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.790739][ T7058] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.817435][ T7058] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.841876][ T6899] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 196.850746][ T6903] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 196.872926][ T6903] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 196.901231][ T6899] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 196.916250][ T3024] Bluetooth: hci2: command 0x041b tx timeout [ 196.922736][ T6903] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 196.953977][ T6903] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 196.990073][ T6899] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 197.013923][ T6897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.058078][ T7058] device hsr_slave_0 entered promiscuous mode [ 197.067539][ T7058] device hsr_slave_1 entered promiscuous mode [ 197.074393][ T7058] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 197.083691][ T7058] Cannot create hsr debugfs directory [ 197.105541][ T6897] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.143805][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.153423][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.166391][ T5] Bluetooth: hci3: command 0x041b tx timeout [ 197.239565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.249322][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.258693][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.266139][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.275643][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.288105][ T6901] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 197.313228][ T6901] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 197.341852][ T6895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.359426][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.373403][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.382819][ T2645] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.389994][ T2645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.402973][ T6901] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 197.410077][ T3024] Bluetooth: hci4: command 0x041b tx timeout [ 197.429917][ T6901] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 197.487556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.508894][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.563649][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.576675][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.585549][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.601581][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.613004][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.622826][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.632380][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.641033][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.656493][ T6895] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.691101][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.703013][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.716972][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.754844][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.774019][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.788431][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.806226][ T3024] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.813295][ T3024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.847208][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.855190][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.868174][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.879806][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.886977][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.944392][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.954313][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.999754][ T7058] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 198.020305][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.030975][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.060858][ T6899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.078308][ T7058] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 198.095671][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.105375][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.114891][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.124157][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.132384][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.140653][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.149823][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.171094][ T2478] Bluetooth: hci5: command 0x041b tx timeout [ 198.181766][ T6897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.196754][ T7058] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 198.218295][ T6899] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.243157][ T6903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.256479][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.264335][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.275655][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.284597][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.294226][ T7058] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 198.315832][ T6901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.325680][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.349076][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.358021][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.368274][ T3024] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.375536][ T3024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.383821][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.392495][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.424198][ T6903] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.451210][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.463273][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.474322][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.490647][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.499503][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.508123][ T2478] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.515390][ T2478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.523886][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.533156][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.541878][ T2478] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.549138][ T2478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.557723][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.565744][ T2478] Bluetooth: hci0: command 0x040f tx timeout [ 198.614041][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.622247][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.631100][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.640209][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.649274][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.657669][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.665442][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.674952][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.684058][ T2478] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.691226][ T2478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.699559][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.709068][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.719972][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.728548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.743668][ T6901] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.756513][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.765657][ T3024] Bluetooth: hci1: command 0x040f tx timeout [ 198.778045][ T6897] device veth0_vlan entered promiscuous mode [ 198.792882][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.804542][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.832326][ T6897] device veth1_vlan entered promiscuous mode [ 198.843740][ T6895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.866773][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 198.879915][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.888752][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.898483][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.908884][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.916026][ T7261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.924322][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.933660][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.942914][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.951872][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.961181][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.970239][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.983493][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.993661][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.002934][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.006304][ T2478] Bluetooth: hci2: command 0x040f tx timeout [ 199.047711][ T6903] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 199.061945][ T6903] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.091409][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.100773][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.114253][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.123661][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.134091][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.144124][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.156558][ T2645] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.163770][ T2645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.196351][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.250435][ T5] Bluetooth: hci3: command 0x040f tx timeout [ 199.279443][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.288563][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.305732][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.314754][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 199.330964][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.361058][ T6897] device veth0_macvtap entered promiscuous mode [ 199.386103][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.394690][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.403750][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.415166][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.423981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.438454][ T6899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.471438][ T6897] device veth1_macvtap entered promiscuous mode [ 199.481474][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.486313][ T5] Bluetooth: hci4: command 0x040f tx timeout [ 199.490772][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.504328][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.512169][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.519879][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.529467][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.540880][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.550197][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.595134][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.603612][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.613076][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.622345][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.631759][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.654770][ T6903] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.664263][ T6895] device veth0_vlan entered promiscuous mode [ 199.680159][ T6901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.694218][ T6901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.704017][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.728584][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.739293][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.751626][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.781239][ T6897] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 199.823786][ T7058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.840236][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.849042][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.867011][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.874466][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.895244][ T6895] device veth1_vlan entered promiscuous mode [ 199.943897][ T6897] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 199.953218][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.967009][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.974954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.985157][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.997355][ T6899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.012729][ T7058] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.030049][ T6901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.053297][ T6897] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.069554][ T6897] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.081570][ T6897] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.093745][ T6897] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.113144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.126956][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.180534][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.191847][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.202248][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.209413][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.218807][ T3024] Bluetooth: hci5: command 0x040f tx timeout [ 200.255014][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.265164][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.274500][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.287523][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.297122][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.305478][ T2478] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.312668][ T2478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.321589][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.345262][ T6895] device veth0_macvtap entered promiscuous mode [ 200.385405][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 200.395736][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.406477][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.415313][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 200.429472][ T6895] device veth1_macvtap entered promiscuous mode [ 200.462567][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.474888][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.485505][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.495318][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.504625][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.519000][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.526962][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.545773][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.554690][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.568107][ T6903] device veth0_vlan entered promiscuous mode [ 200.593216][ T6899] device veth0_vlan entered promiscuous mode [ 200.627659][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.635659][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.647707][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.658142][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.667011][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.675381][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.685661][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.703227][ T6903] device veth1_vlan entered promiscuous mode [ 200.713868][ T5] Bluetooth: hci0: command 0x0419 tx timeout [ 200.740669][ T6895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.753908][ T6895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.768755][ T6895] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.776676][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 200.784785][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 200.795139][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.803292][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.811987][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.820738][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.829340][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.839374][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.873491][ T6899] device veth1_vlan entered promiscuous mode [ 200.890153][ T2478] Bluetooth: hci1: command 0x0419 tx timeout [ 200.919544][ T6895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.938344][ T6895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.967893][ T6895] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 201.032829][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 201.057910][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.066874][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.076954][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.085405][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.095103][ T3024] Bluetooth: hci2: command 0x0419 tx timeout [ 201.110858][ T6895] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.124454][ T6895] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.133605][ T6895] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.142836][ T6895] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 201.158722][ T7058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.197675][ T6901] device veth0_vlan entered promiscuous mode [ 201.209339][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.219142][ T173] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.233412][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.243806][ T173] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.254475][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.264493][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.282940][ T6903] device veth0_macvtap entered promiscuous mode [ 201.314388][ T6901] device veth1_vlan entered promiscuous mode [ 201.320908][ T3024] Bluetooth: hci3: command 0x0419 tx timeout [ 201.341678][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 201.355481][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.376938][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.384939][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.403806][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 201.412526][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.421685][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.436429][ T6899] device veth0_macvtap entered promiscuous mode [ 201.457335][ T6903] device veth1_macvtap entered promiscuous mode [ 201.487780][ T143] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 201.495774][ T143] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 201.511932][ T7058] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.532998][ T6899] device veth1_macvtap entered promiscuous mode [ 201.556665][ T3024] Bluetooth: hci4: command 0x0419 tx timeout [ 201.562840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.578463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 201.590814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.600042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.608730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 201.617536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.624996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.710731][ T6903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.755122][ T6903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.767369][ T6903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.796374][ T6903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.827153][ T6903] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.834556][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.857323][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.866920][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.875642][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.907438][ T6901] device veth0_macvtap entered promiscuous mode [ 201.936353][ T8240] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 201.955490][ T6903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.991154][ T6903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.008065][ T6903] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.019329][ T6903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.031657][ T6903] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 202.050753][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.063513][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.075433][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.087923][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.098020][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.108946][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.121242][ T6899] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 202.135956][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 202.144114][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.154290][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.165951][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.174862][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.188926][ T6903] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.199565][ T6903] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.208523][ T6903] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.222401][ T6903] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.236673][ T6901] device veth1_macvtap entered promiscuous mode [ 202.270458][ T8240] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 202.281674][ T12] Bluetooth: hci5: command 0x0419 tx timeout [ 202.293285][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.305413][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.315755][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.332342][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.344187][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.355274][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.368703][ T6899] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 202.394044][ T173] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 202.424884][ T173] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 01:07:48 executing program 1: [ 202.442587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.461465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.491871][ T6899] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.516831][ T6899] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 01:07:48 executing program 1: [ 202.535888][ T6899] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.544620][ T6899] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.581670][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 01:07:48 executing program 1: [ 202.607240][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.622906][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.645896][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:07:48 executing program 1: [ 202.680769][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 202.715817][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.725670][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 01:07:48 executing program 1: [ 202.766729][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.793918][ T6901] batman_adv: batadv0: Interface activated: batadv_slave_0 01:07:48 executing program 1: [ 202.853008][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 202.871479][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.881949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.941656][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.974978][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.006723][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.035397][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.046062][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.065798][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.075641][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 203.105823][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.140792][ T6901] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.169377][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.179619][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.191606][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.203106][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.240801][ T8232] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 203.255276][ T8232] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 203.319528][ T6901] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.355818][ T6901] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.364629][ T6901] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.386448][ T6901] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.405034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 203.421067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.431154][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.441581][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.450054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.560232][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 203.562039][ T7058] device veth0_vlan entered promiscuous mode 01:07:49 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:49 executing program 1: [ 203.603911][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 203.611874][ T28] audit: type=1800 audit(1603156069.660:2): pid=8296 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15747 res=0 errno=0 [ 203.694804][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 203.703382][ T41] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 203.718655][ T41] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 203.729685][ T28] audit: type=1800 audit(1603156069.670:3): pid=8297 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15747 res=0 errno=0 [ 203.739886][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 203.811306][ T28] audit: type=1800 audit(1603156069.860:4): pid=8310 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15748 res=0 errno=0 [ 203.869809][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 203.886397][ T7058] device veth1_vlan entered promiscuous mode [ 203.901387][ T41] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 203.905258][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 203.923012][ T41] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 203.940134][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 203.958934][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 203.967390][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 204.047761][ T8232] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 204.063537][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 204.088905][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.097011][ T8232] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 204.106867][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.150502][ T7058] device veth0_macvtap entered promiscuous mode 01:07:50 executing program 2: [ 204.192124][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 204.211304][ T2478] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.233513][ T7058] device veth1_macvtap entered promiscuous mode [ 204.264938][ T8232] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 204.301215][ T8232] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 204.345324][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.366985][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.382414][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.400554][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.411129][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.422267][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.432814][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.455274][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.475036][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 204.497084][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.521074][ T7058] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 204.537794][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 204.554003][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.564081][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.610028][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.663208][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.688912][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 01:07:50 executing program 3: 01:07:50 executing program 1: [ 204.717119][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.735116][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.770418][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.793325][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.824836][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.869329][ T7058] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 204.896108][ T7058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.909051][ T7058] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.986015][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.008132][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.031027][ T7058] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.048994][ T7058] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.085840][ T7058] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.094582][ T7058] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.322064][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 205.338343][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 205.370578][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 205.402951][ T8232] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 205.414439][ T8232] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 205.432843][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 01:07:51 executing program 5: 01:07:51 executing program 4: 01:07:51 executing program 2: 01:07:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:51 executing program 1: 01:07:51 executing program 3: 01:07:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 205.649009][ T28] audit: type=1800 audit(1603156071.701:5): pid=8385 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15769 res=0 errno=0 01:07:51 executing program 4: 01:07:51 executing program 2: 01:07:51 executing program 1: 01:07:51 executing program 3: 01:07:51 executing program 5: 01:07:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 205.862112][ T28] audit: type=1800 audit(1603156071.911:6): pid=8393 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15775 res=0 errno=0 01:07:52 executing program 2: 01:07:52 executing program 4: 01:07:52 executing program 1: 01:07:52 executing program 3: 01:07:52 executing program 5: 01:07:52 executing program 4: 01:07:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 206.061035][ T28] audit: type=1800 audit(1603156072.111:7): pid=8402 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15776 res=0 errno=0 [ 206.090265][ T8402] 9pnet: Insufficient options for proto=fd 01:07:52 executing program 2: 01:07:52 executing program 3: 01:07:52 executing program 1: 01:07:52 executing program 4: 01:07:52 executing program 5: 01:07:52 executing program 2: 01:07:52 executing program 3: 01:07:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 206.337326][ T28] audit: type=1800 audit(1603156072.391:8): pid=8412 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15776 res=0 errno=0 [ 206.361632][ T8412] 9pnet: Insufficient options for proto=fd 01:07:52 executing program 1: 01:07:52 executing program 4: 01:07:52 executing program 5: 01:07:52 executing program 2: 01:07:52 executing program 3: [ 206.567150][ T28] audit: type=1800 audit(1603156072.621:9): pid=8423 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15784 res=0 errno=0 [ 206.572017][ T8423] 9pnet: Insufficient options for proto=fd 01:07:52 executing program 4: 01:07:52 executing program 1: 01:07:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:52 executing program 5: 01:07:52 executing program 3: 01:07:52 executing program 2: 01:07:52 executing program 1: 01:07:52 executing program 4: [ 206.837805][ T28] audit: type=1800 audit(1603156072.891:10): pid=8433 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15787 res=0 errno=0 01:07:52 executing program 5: 01:07:52 executing program 3: 01:07:53 executing program 2: 01:07:53 executing program 1: 01:07:53 executing program 4: 01:07:53 executing program 3: 01:07:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:53 executing program 5: 01:07:53 executing program 2: 01:07:53 executing program 4: 01:07:53 executing program 1: 01:07:53 executing program 3: 01:07:53 executing program 4: 01:07:53 executing program 1: 01:07:53 executing program 5: 01:07:53 executing program 2: 01:07:53 executing program 3: [ 207.874349][ T28] audit: type=1800 audit(1603156073.921:11): pid=8459 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15776 res=0 errno=0 01:07:54 executing program 4: 01:07:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:54 executing program 1: 01:07:54 executing program 5: 01:07:54 executing program 3: 01:07:54 executing program 2: 01:07:54 executing program 4: 01:07:54 executing program 2: 01:07:54 executing program 3: 01:07:54 executing program 4: 01:07:54 executing program 1: 01:07:54 executing program 5: [ 208.817524][ T28] audit: type=1800 audit(1603156074.871:12): pid=8476 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15778 res=0 errno=0 01:07:54 executing program 1: 01:07:55 executing program 3: 01:07:55 executing program 4: 01:07:55 executing program 5: 01:07:55 executing program 2: 01:07:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:55 executing program 1: 01:07:55 executing program 4: 01:07:55 executing program 5: 01:07:55 executing program 1: 01:07:55 executing program 3: 01:07:55 executing program 2: 01:07:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:55 executing program 1: 01:07:55 executing program 5: 01:07:55 executing program 4: 01:07:55 executing program 2: 01:07:55 executing program 3: 01:07:56 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:56 executing program 1: 01:07:56 executing program 5: 01:07:56 executing program 4: 01:07:56 executing program 3: 01:07:56 executing program 2: 01:07:56 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:56 executing program 5: 01:07:56 executing program 1: 01:07:56 executing program 4: 01:07:56 executing program 2: 01:07:56 executing program 3: [ 210.316532][ T28] audit: type=1800 audit(1603156076.371:13): pid=8528 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15794 res=0 errno=0 01:07:56 executing program 5: 01:07:56 executing program 1: 01:07:56 executing program 2: 01:07:56 executing program 4: 01:07:56 executing program 3: 01:07:56 executing program 2: 01:07:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:57 executing program 5: 01:07:57 executing program 1: 01:07:57 executing program 3: 01:07:57 executing program 4: 01:07:57 executing program 2: 01:07:57 executing program 1: 01:07:57 executing program 2: 01:07:57 executing program 5: 01:07:57 executing program 4: 01:07:57 executing program 3: 01:07:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 211.299316][ T28] audit: type=1800 audit(1603156077.351:14): pid=8560 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15818 res=0 errno=0 01:07:57 executing program 1: 01:07:57 executing program 5: 01:07:57 executing program 4: 01:07:57 executing program 2: 01:07:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 211.478816][ T28] audit: type=1800 audit(1603156077.531:15): pid=8567 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15823 res=0 errno=0 01:07:57 executing program 3: 01:07:57 executing program 1: 01:07:57 executing program 4: 01:07:57 executing program 5: 01:07:57 executing program 2: [ 211.675413][ T28] audit: type=1800 audit(1603156077.721:16): pid=8576 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15818 res=0 errno=0 01:07:57 executing program 3: 01:07:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:57 executing program 1: 01:07:57 executing program 5: 01:07:57 executing program 4: 01:07:57 executing program 2: [ 211.893986][ T28] audit: type=1800 audit(1603156077.941:17): pid=8585 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15765 res=0 errno=0 01:07:58 executing program 3: 01:07:58 executing program 1: 01:07:58 executing program 5: 01:07:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:58 executing program 4: 01:07:58 executing program 2: 01:07:58 executing program 3: 01:07:58 executing program 5: 01:07:58 executing program 4: 01:07:58 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 01:07:58 executing program 1: [ 212.199544][ T28] audit: type=1800 audit(1603156078.251:18): pid=8597 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15791 res=0 errno=0 01:07:58 executing program 2: 01:07:58 executing program 3: 01:07:58 executing program 5: 01:07:58 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 01:07:58 executing program 1: 01:07:58 executing program 4: [ 212.418100][ T28] audit: type=1800 audit(1603156078.471:19): pid=8606 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15793 res=0 errno=0 01:07:58 executing program 5: 01:07:58 executing program 2: 01:07:58 executing program 3: 01:07:58 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) 01:07:58 executing program 1: [ 212.616498][ T28] audit: type=1800 audit(1603156078.671:20): pid=8614 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15797 res=0 errno=0 01:07:58 executing program 4: 01:07:58 executing program 5: 01:07:58 executing program 2: 01:07:58 executing program 3: 01:07:58 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 212.829615][ T28] audit: type=1800 audit(1603156078.881:21): pid=8622 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15791 res=0 errno=0 01:07:58 executing program 1: 01:07:59 executing program 4: 01:07:59 executing program 5: 01:07:59 executing program 2: 01:07:59 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:59 executing program 3: 01:07:59 executing program 1: 01:07:59 executing program 5: 01:07:59 executing program 4: 01:07:59 executing program 2: 01:07:59 executing program 3: 01:07:59 executing program 0: r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:59 executing program 1: 01:07:59 executing program 5: 01:07:59 executing program 2: 01:07:59 executing program 4: 01:07:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:59 executing program 3: 01:07:59 executing program 1: 01:07:59 executing program 5: 01:07:59 executing program 4: 01:07:59 executing program 2: 01:07:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:59 executing program 3: 01:07:59 executing program 5: 01:07:59 executing program 4: 01:07:59 executing program 1: 01:07:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:07:59 executing program 2: 01:08:00 executing program 5: 01:08:00 executing program 1: 01:08:00 executing program 3: 01:08:00 executing program 4: 01:08:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 213.982989][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 213.983006][ T28] audit: type=1800 audit(1603156080.031:27): pid=8671 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15821 res=0 errno=0 01:08:00 executing program 2: 01:08:00 executing program 5: 01:08:00 executing program 1: 01:08:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 214.184173][ T28] audit: type=1800 audit(1603156080.231:28): pid=8680 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15765 res=0 errno=0 01:08:00 executing program 3: 01:08:00 executing program 4: 01:08:00 executing program 2: 01:08:00 executing program 3: 01:08:00 executing program 1: 01:08:00 executing program 5: 01:08:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:00 executing program 2: [ 214.460627][ T28] audit: type=1800 audit(1603156080.511:29): pid=8691 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15793 res=0 errno=0 01:08:00 executing program 4: 01:08:00 executing program 3: 01:08:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:00 executing program 1: 01:08:00 executing program 5: [ 214.636116][ T28] audit: type=1800 audit(1603156080.691:30): pid=8699 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15791 res=0 errno=0 01:08:00 executing program 2: 01:08:00 executing program 3: 01:08:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 214.787709][ T28] audit: type=1800 audit(1603156080.841:31): pid=8704 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15836 res=0 errno=0 01:08:00 executing program 4: 01:08:00 executing program 1: 01:08:00 executing program 5: 01:08:01 executing program 2: 01:08:01 executing program 3: 01:08:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 215.028579][ T28] audit: type=1800 audit(1603156081.081:32): pid=8713 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15847 res=0 errno=0 01:08:01 executing program 4: 01:08:01 executing program 1: 01:08:01 executing program 5: 01:08:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:01 executing program 2: [ 215.203605][ T28] audit: type=1800 audit(1603156081.251:33): pid=8721 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15846 res=0 errno=0 01:08:01 executing program 3: 01:08:01 executing program 1: 01:08:01 executing program 5: 01:08:01 executing program 4: 01:08:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 215.398501][ T28] audit: type=1800 audit(1603156081.451:34): pid=8729 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15844 res=0 errno=0 01:08:01 executing program 2: 01:08:01 executing program 3: 01:08:01 executing program 1: 01:08:01 executing program 4: 01:08:01 executing program 5: 01:08:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 215.644347][ T28] audit: type=1800 audit(1603156081.691:35): pid=8736 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15845 res=0 errno=0 01:08:01 executing program 4: 01:08:01 executing program 2: 01:08:01 executing program 3: 01:08:01 executing program 1: 01:08:01 executing program 5: 01:08:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, 0x0, 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 215.824572][ T28] audit: type=1800 audit(1603156081.871:36): pid=8746 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15845 res=0 errno=0 01:08:01 executing program 2: 01:08:02 executing program 3: 01:08:02 executing program 4: 01:08:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, 0x0, 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:02 executing program 1: 01:08:02 executing program 5: 01:08:02 executing program 2: 01:08:02 executing program 3: 01:08:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, 0x0, 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:02 executing program 4: 01:08:02 executing program 1: 01:08:02 executing program 5: 01:08:02 executing program 2: 01:08:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:02 executing program 3: 01:08:02 executing program 4: 01:08:02 executing program 1: 01:08:02 executing program 5: 01:08:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:02 executing program 2: 01:08:02 executing program 4: 01:08:02 executing program 3: 01:08:02 executing program 1: 01:08:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:02 executing program 3: 01:08:02 executing program 2: 01:08:02 executing program 4: 01:08:02 executing program 5: 01:08:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:02 executing program 1: 01:08:03 executing program 3: 01:08:03 executing program 4: 01:08:03 executing program 5: 01:08:03 executing program 2: 01:08:03 executing program 1: 01:08:03 executing program 3: 01:08:03 executing program 5: 01:08:03 executing program 4: 01:08:03 executing program 2: 01:08:03 executing program 1: 01:08:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:03 executing program 4: 01:08:03 executing program 3: 01:08:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32], 0x50}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 01:08:03 executing program 2: futimesat(0xffffffffffffff9c, 0x0, &(0x7f0000005180)={{0x0, 0x2710}, {0x0, 0x2710}}) 01:08:03 executing program 1: setreuid(0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 01:08:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 01:08:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000006840), 0x0, 0x0) 01:08:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x3}, 0x6e) 01:08:04 executing program 2: syz_mount_image$vfat(&(0x7f00000065c0)='vfat\x00', &(0x7f0000006600)='./file0\x00', 0x0, 0x0, &(0x7f0000006840), 0x0, &(0x7f0000006880)={[{@shortname_winnt='shortname=winnt'}]}) 01:08:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, r1, 0x711, 0x0, 0x0, {0x8}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 01:08:04 executing program 4: semtimedop(0x0, &(0x7f0000003780)=[{0x0, 0x41, 0x1800}, {}], 0x2, &(0x7f0000003800)) [ 218.248464][ T8844] FAT-fs (loop2): bogus number of reserved sectors [ 218.306485][ T8844] FAT-fs (loop2): Can't find a valid FAT filesystem [ 218.404288][ T8844] FAT-fs (loop2): bogus number of reserved sectors [ 218.439646][ T8844] FAT-fs (loop2): Can't find a valid FAT filesystem 01:08:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32], 0x50}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 01:08:04 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x44440, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, 0x0) 01:08:04 executing program 3: setfsuid(0xee01) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 01:08:04 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x38, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}]}, 0x14, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) [ 218.845417][ C0] hrtimer: interrupt took 44820 ns 01:08:04 executing program 2: mq_unlink(&(0x7f0000000080)='.\x00') 01:08:05 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 01:08:05 executing program 1: syz_mount_image$vfat(&(0x7f00000065c0)='vfat\x00', &(0x7f0000006600)='./file0\x00', 0x0, 0x0, &(0x7f0000006840), 0x0, &(0x7f0000006880)={[{@shortname_mixed='shortname=mixed'}]}) [ 219.045244][ T8893] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:05 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:05 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:05 executing program 2: syz_mount_image$vfat(&(0x7f00000065c0)='vfat\x00', &(0x7f0000006600)='./file0\x00', 0x0, 0x0, &(0x7f0000006840), 0x0, &(0x7f0000006880)={[{@shortname_mixed='shortname=mixed'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}) [ 219.235106][ T21] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 219.272553][ T8909] FAT-fs (loop1): bogus number of reserved sectors [ 219.307566][ T8909] FAT-fs (loop1): Can't find a valid FAT filesystem [ 219.454572][ T8909] FAT-fs (loop1): bogus number of reserved sectors [ 219.462029][ T8915] FAT-fs (loop2): Unrecognized mount option "fscontext=system_u" or missing value [ 219.473065][ T8909] FAT-fs (loop1): Can't find a valid FAT filesystem [ 219.638160][ T8915] FAT-fs (loop2): Unrecognized mount option "fscontext=system_u" or missing value 01:08:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:05 executing program 3: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x1000) 01:08:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000048c0)={0x14, 0x0, 0x0, 0x0, 0x0, "", [@generic="9b"]}, 0x14}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 01:08:05 executing program 2: open(&(0x7f0000003400)='./file0\x00', 0x2140, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)='security.evm\x00', 0x0, 0x0, 0x0) 01:08:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 01:08:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 220.075062][ T8916] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 220.085290][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 220.085306][ T28] audit: type=1800 audit(1603156086.121:41): pid=8945 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15894 res=0 errno=0 01:08:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 220.123929][ T8922] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:06 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x28021, 0x0) 01:08:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x22060400) r0 = gettid() clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffff9c, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000014c0)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000480)={r2, 0x4, 0x101}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f00000004c0)={0x0, "0a08e337487bb5cce7e9c806f77e346f"}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000340)={r2, 0x941, 0x0, 0x1}) wait4(0x0, 0x0, 0x0, 0x0) [ 220.323379][ T28] audit: type=1800 audit(1603156086.201:42): pid=8949 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15895 res=0 errno=0 01:08:06 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:06 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f00000000c0)={0x9}, 0x0, 0x0, 0x0) 01:08:06 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) [ 220.432216][ T28] audit: type=1800 audit(1603156086.421:43): pid=8959 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15870 res=0 errno=0 [ 220.510038][ T8967] ptrace attach of "/root/syz-executor.3"[8966] was attempted by "/root/syz-executor.3"[8967] 01:08:06 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 220.541833][ T28] audit: type=1800 audit(1603156086.591:44): pid=8969 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15891 res=0 errno=0 01:08:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 01:08:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x22060400) r0 = gettid() clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffff9c, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f00000014c0)={0x0, 0x0, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000480)={r2, 0x4, 0x101}) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f00000004c0)={0x0, "0a08e337487bb5cce7e9c806f77e346f"}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000340)={r2, 0x941, 0x0, 0x1}) wait4(0x0, 0x0, 0x0, 0x0) 01:08:06 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000580)={0x18, r1, 0x8c7488dcc7f7cf2f, 0x0, 0x0, {0xf}, [@HEADER={0x4}]}, 0x18}}, 0x0) 01:08:06 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 220.778783][ T28] audit: type=1800 audit(1603156086.831:45): pid=8989 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15892 res=0 errno=0 01:08:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="640000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800b000100697036746e6c000020000280080014000180000014000300ff"], 0x64}}, 0x0) 01:08:07 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() r2 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}], 0x1, 0x0) [ 221.081457][ T28] audit: type=1800 audit(1603156087.131:46): pid=9007 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15901 res=0 errno=0 [ 221.190745][ T8987] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 221.215807][ T9016] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 01:08:07 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, 0x0) 01:08:07 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, 0x0, 0x0) 01:08:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) 01:08:07 executing program 3: open(&(0x7f0000006900)='./file0\x00', 0x0, 0x0) 01:08:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, 0x0) 01:08:07 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xbbe97662e303c504) [ 221.409872][ T28] audit: type=1800 audit(1603156087.461:47): pid=9027 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15902 res=0 errno=0 01:08:07 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000002140)='nl80211\x00') pivot_root(0x0, 0x0) [ 221.484429][ T9006] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 221.722177][ T9040] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:07 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) 01:08:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@ldst={0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa7, &(0x7f00000002c0)=""/167, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:08:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000040)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, 0xfffffffffffffff9) 01:08:07 executing program 1: name_to_handle_at(0xffffffffffffffff, &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, 0x0) [ 221.773095][ T28] audit: type=1800 audit(1603156087.821:48): pid=9043 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15860 res=0 errno=0 01:08:08 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, 0x0) 01:08:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(0x0, 0x0) close(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)) 01:08:08 executing program 1: open(0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x49f9, &(0x7f0000000740)={0x0, 0x94a4, 0x8}) 01:08:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa7, &(0x7f00000002c0)=""/167, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 222.308603][ T7] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 222.374067][ T9065] [ 222.376767][ T9065] ============================= [ 222.397072][ T9065] WARNING: suspicious RCU usage [ 222.421440][ T28] audit: type=1800 audit(1603156088.471:49): pid=9066 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15861 res=0 errno=0 [ 222.450888][ T9065] 5.9.0-next-20201016-syzkaller #0 Not tainted [ 222.488939][ T9065] ----------------------------- [ 222.513649][ T9065] include/linux/cgroup.h:494 suspicious rcu_dereference_check() usage! 01:08:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 222.570306][ T9065] [ 222.570306][ T9065] other info that might help us debug this: [ 222.570306][ T9065] [ 222.583730][ T9055] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 222.638772][ T9065] [ 222.638772][ T9065] rcu_scheduler_active = 2, debug_locks = 1 01:08:08 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x0, 0x0) pselect6(0x7ffff, &(0x7f0000000040), 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) [ 222.691238][ T9065] no locks held by syz-executor.1/9065. [ 222.725658][ T9065] [ 222.725658][ T9065] stack backtrace: [ 222.737745][ T28] audit: type=1800 audit(1603156088.791:50): pid=9082 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15909 res=0 errno=0 [ 222.771595][ T9082] 9pnet: Insufficient options for proto=fd [ 222.792696][ T9065] CPU: 0 PID: 9065 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 222.802199][ T9065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.812277][ T9065] Call Trace: [ 222.815591][ T9065] dump_stack+0x198/0x1fb [ 222.819940][ T9065] io_init_identity+0x3a9/0x450 [ 222.824805][ T9065] io_uring_alloc_task_context+0x176/0x250 [ 222.830674][ T9065] io_uring_add_task_file+0x10d/0x180 [ 222.836063][ T9065] io_uring_setup+0x2727/0x3660 [ 222.840955][ T9065] ? io_sq_thread+0x1400/0x1400 [ 222.845828][ T9065] ? io_issue_sqe+0x3d80/0x3d80 [ 222.850697][ T9065] ? io_uring_poll+0x2a0/0x2a0 [ 222.855488][ T9065] ? put_timespec64+0xcb/0x120 [ 222.860281][ T9065] ? ns_to_timespec64+0xc0/0xc0 [ 222.865147][ T9065] ? check_preemption_disabled+0x50/0x130 [ 222.870888][ T9065] ? syscall_enter_from_user_mode+0x1d/0x60 [ 222.876814][ T9065] do_syscall_64+0x2d/0x70 [ 222.881247][ T9065] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 222.887148][ T9065] RIP: 0033:0x45de59 [ 222.891051][ T9065] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.910674][ T9065] RSP: 002b:00007f62af0e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 222.919113][ T9065] RAX: ffffffffffffffda RBX: 00000000000085c0 RCX: 000000000045de59 [ 222.927112][ T9065] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 00000000000049f9 [ 222.935221][ T9065] RBP: 000000000118bf58 R08: 0000000000000000 R09: 0000000000000000 01:08:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 222.943214][ T9065] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 222.951209][ T9065] R13: 00007ffc31846e4f R14: 00007f62af0e29c0 R15: 000000000118bf2c 01:08:09 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) 01:08:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 223.060645][ T9088] 9pnet: Insufficient options for proto=fd 01:08:09 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) 01:08:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 223.186122][ T9097] 9pnet: Insufficient options for proto=fd [ 223.270794][ T9079] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 223.352231][ T9104] 9pnet: Insufficient options for proto=fd 01:08:09 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000580)={0x18, r1, 0x8c7488dcc7f7cf2f, 0x0, 0x0, {0x6}, [@HEADER={0x4}]}, 0x18}}, 0x0) 01:08:09 executing program 1: syz_mount_image$vfat(&(0x7f00000065c0)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f0000006840)=[{&(0x7f0000006740)="c5", 0x1}], 0x0, &(0x7f0000006880)) 01:08:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) [ 223.519231][ T9108] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:09 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000005140)='./file0\x00', &(0x7f0000005180)={{0x0, 0x2710}, {0x0, 0x2710}}) [ 223.711459][ T9122] 9pnet: Insufficient options for proto=fd 01:08:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x10, 0x4, 0x4, 0xfffffffe}, 0x40) 01:08:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x84842, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 01:08:09 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) 01:08:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 223.847524][ T9135] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:09 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 01:08:10 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000031c0)) [ 224.104385][ T9154] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 224.119899][ T9150] 9pnet: Insufficient options for proto=fd 01:08:10 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:10 executing program 0: syz_mount_image$vfat(&(0x7f00000065c0)='vfat\x00', &(0x7f0000006600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000006880)) 01:08:10 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x5, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa7, &(0x7f00000002c0)=""/167, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:08:10 executing program 1: perf_event_open(&(0x7f00000001c0)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 224.405225][ T8232] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 224.415139][ T143] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:10 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="14b97472616e733d7463703030303030303034302c00"/31]) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x10000) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0xc001, 0x0) getsockname$unix(r2, &(0x7f0000000300), &(0x7f0000000380)=0x6e) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f00000000c0)) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x5) 01:08:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:10 executing program 1: unshare(0x2a040600) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000e4ff280012000900010076657468"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fchdir(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000013c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x4}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x8, 0x2, [@TCA_ROUTE4_POLICE={0x4}]}}]}, 0x38}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x10000000) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:08:10 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0x9, &(0x7f0000000000)={0x4}, 0x8) [ 224.709230][ T9184] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:08:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 224.831896][ T9186] 9pnet_virtio: no channels available for device 127.0.0.1 01:08:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 224.935677][ T9198] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 225.008023][ T9186] 9pnet_virtio: no channels available for device 127.0.0.1 [ 225.126573][ T9176] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:11 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:11 executing program 1: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') mlockall(0x2) r1 = memfd_create(&(0x7f0000000080)='\x15\xf7^\xf9\x12\x0f\xbd+\xa7\xce\xfa%\x98\xc6\x1e\x1e\xf8\x0213\xce\x89x\xb6\x9b\xfbp\x9f\xd5\x9d\b\xb7\x1b\xcc\x91\xc9\x12\xb01\xa8\x1e\xdb\xea+\xfd\x8d\xe7\xdc\x90\x90\xa8\x1a\xa6%\xc2\x85d?\x15W\xc0\xb9\xfb\x01&\xbb\xce6\xe7\x96\xf2\xf5\n!\xc5\xe2\xef\xce\xff\xec\xac9\x98\xb4<\xc5|\x0e\xae', 0x200) ftruncate(r1, 0x800799c) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xad158a7b0bd0246c, 0x13, r1, 0x0) ftruncate(r1, 0xff0f) preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0, 0x0) 01:08:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x3, 0x2, 0x301}, 0x14}}, 0x0) 01:08:11 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="14b97472616e733d7463703030303030303034302c00"/31]) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x10000) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0xc001, 0x0) getsockname$unix(r2, &(0x7f0000000300), &(0x7f0000000380)=0x6e) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f00000000c0)) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x5) 01:08:11 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x17, 0x0, 0x3, 0xfffffffd}, 0x40) 01:08:11 executing program 1: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) [ 225.567874][ T9223] 9pnet_virtio: no channels available for device 127.0.0.1 01:08:11 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 225.673790][ T9235] check_preemption_disabled: 5 callbacks suppressed [ 225.673809][ T9235] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/9235 [ 225.690058][ T9235] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 225.696697][ T9235] CPU: 1 PID: 9235 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 225.706162][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.716328][ T9235] Call Trace: [ 225.719652][ T9235] dump_stack+0x198/0x1fb [ 225.724019][ T9235] check_preemption_disabled+0x128/0x130 [ 225.729686][ T9235] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 225.735438][ T9235] trace_hardirqs_on+0x5b/0x1c0 [ 225.740318][ T9235] __bad_area_nosemaphore+0xc6/0x4f0 [ 225.745634][ T9235] do_user_addr_fault+0x852/0xbf0 [ 225.750691][ T9235] exc_page_fault+0xa8/0x190 [ 225.755309][ T9235] ? asm_exc_page_fault+0x8/0x30 [ 225.760269][ T9235] asm_exc_page_fault+0x1e/0x30 [ 225.765143][ T9235] RIP: 0033:0x43c496 [ 225.769059][ T9235] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 225.788688][ T9235] RSP: 002b:00007f62af0e1a88 EFLAGS: 00010293 [ 225.794779][ T9235] RAX: 0000000000000000 RBX: 00007f62af0e1b20 RCX: 0000000000000000 [ 225.802769][ T9235] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 225.810764][ T9235] RBP: 00007f62af0e1ae0 R08: 00007f62af0e1ad8 R09: 0000000000000000 01:08:11 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:11 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) [ 225.818753][ T9235] R10: 00007f62af0e1adc R11: 0000000000000213 R12: 0000000000000000 [ 225.826838][ T9235] R13: 0000000000000000 R14: 0000000020000280 R15: 0000000000000000 [ 225.836504][ T9235] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/9235 [ 225.846688][ T9235] caller is lockdep_hardirqs_on+0x34/0x110 [ 225.852520][ T9235] CPU: 1 PID: 9235 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 225.868235][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.878307][ T9235] Call Trace: [ 225.881739][ T9235] dump_stack+0x198/0x1fb [ 225.886099][ T9235] check_preemption_disabled+0x128/0x130 [ 225.891750][ T9235] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 225.897229][ T9235] lockdep_hardirqs_on+0x34/0x110 [ 225.902276][ T9235] __bad_area_nosemaphore+0xc6/0x4f0 [ 225.907596][ T9235] do_user_addr_fault+0x852/0xbf0 [ 225.912658][ T9235] exc_page_fault+0xa8/0x190 [ 225.917275][ T9235] ? asm_exc_page_fault+0x8/0x30 01:08:12 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) [ 225.922239][ T9235] asm_exc_page_fault+0x1e/0x30 [ 225.927105][ T9235] RIP: 0033:0x43c496 [ 225.931018][ T9235] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 225.950649][ T9235] RSP: 002b:00007f62af0e1a88 EFLAGS: 00010293 [ 225.956745][ T9235] RAX: 0000000000000000 RBX: 00007f62af0e1b20 RCX: 0000000000000000 [ 225.964739][ T9235] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 225.972730][ T9235] RBP: 00007f62af0e1ae0 R08: 00007f62af0e1ad8 R09: 0000000000000000 [ 225.980720][ T9235] R10: 00007f62af0e1adc R11: 0000000000000213 R12: 0000000000000000 [ 225.988717][ T9235] R13: 0000000000000000 R14: 0000000020000280 R15: 0000000000000000 01:08:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_destroy(0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 226.079310][ T9235] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/9235 [ 226.088814][ T9235] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 226.095438][ T9235] CPU: 0 PID: 9235 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 226.104905][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.114972][ T9235] Call Trace: [ 226.118286][ T9235] dump_stack+0x198/0x1fb [ 226.122639][ T9235] check_preemption_disabled+0x128/0x130 [ 226.128298][ T9235] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 226.134046][ T9235] trace_hardirqs_on+0x5b/0x1c0 [ 226.138923][ T9235] __bad_area_nosemaphore+0xc6/0x4f0 [ 226.144233][ T9235] do_user_addr_fault+0x852/0xbf0 [ 226.149288][ T9235] exc_page_fault+0xa8/0x190 [ 226.153893][ T9235] ? asm_exc_page_fault+0x8/0x30 [ 226.158843][ T9235] asm_exc_page_fault+0x1e/0x30 [ 226.163698][ T9235] RIP: 0033:0x43c496 [ 226.167600][ T9235] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 226.187219][ T9235] RSP: 002b:00007f62af0e1a88 EFLAGS: 00010293 [ 226.193335][ T9235] RAX: 0000000000000000 RBX: 00007f62af0e1b20 RCX: 0000000000000000 [ 226.201332][ T9235] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 226.209322][ T9235] RBP: 00007f62af0e1ae0 R08: 00007f62af0e1ad8 R09: 0000000000000000 [ 226.217314][ T9235] R10: 00007f62af0e1adc R11: 0000000000000213 R12: 0000000000000000 [ 226.225300][ T9235] R13: 0000000000000000 R14: 0000000020000280 R15: 0000000000000000 [ 226.234235][ T9235] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/9235 [ 226.243809][ T9235] caller is lockdep_hardirqs_on+0x34/0x110 [ 226.249700][ T9235] CPU: 0 PID: 9235 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 226.259164][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.269272][ T9235] Call Trace: [ 226.272586][ T9235] dump_stack+0x198/0x1fb [ 226.276942][ T9235] check_preemption_disabled+0x128/0x130 [ 226.282597][ T9235] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 226.288076][ T9235] lockdep_hardirqs_on+0x34/0x110 [ 226.293119][ T9235] __bad_area_nosemaphore+0xc6/0x4f0 [ 226.298432][ T9235] do_user_addr_fault+0x852/0xbf0 [ 226.303485][ T9235] exc_page_fault+0xa8/0x190 [ 226.308095][ T9235] ? asm_exc_page_fault+0x8/0x30 [ 226.313051][ T9235] asm_exc_page_fault+0x1e/0x30 [ 226.317909][ T9235] RIP: 0033:0x43c496 [ 226.321819][ T9235] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 226.341549][ T9235] RSP: 002b:00007f62af0e1a88 EFLAGS: 00010293 [ 226.347643][ T9235] RAX: 0000000000000000 RBX: 00007f62af0e1b20 RCX: 0000000000000000 [ 226.355631][ T9235] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 226.363620][ T9235] RBP: 00007f62af0e1ae0 R08: 00007f62af0e1ad8 R09: 0000000000000000 [ 226.371613][ T9235] R10: 00007f62af0e1adc R11: 0000000000000213 R12: 0000000000000000 01:08:12 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:12 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 01:08:12 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_destroy(0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 226.379605][ T9235] R13: 0000000000000000 R14: 0000000020000280 R15: 0000000000000000 01:08:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x400, 0x0, 0x6}, 0x40) 01:08:12 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000006840)=[{&(0x7f0000006640)="9e", 0x1}, {&(0x7f0000006740)="c5", 0x1}], 0x0, 0x0) [ 226.668874][ T9281] overlayfs: overlapping lowerdir path 01:08:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_destroy(0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) [ 226.874740][ T9272] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:13 executing program 0: timer_create(0x1, 0x0, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, r0+60000000}}, 0x0) [ 227.091324][ T9296] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/9296 [ 227.100847][ T9296] caller is lockdep_hardirqs_on_prepare+0x5e/0x450 [ 227.107525][ T9296] CPU: 1 PID: 9296 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 227.117012][ T9296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.127093][ T9296] Call Trace: [ 227.130407][ T9296] dump_stack+0x198/0x1fb [ 227.134763][ T9296] check_preemption_disabled+0x128/0x130 01:08:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xa7, &(0x7f00000002c0)=""/167, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='virtio_transport_recv_pkt\x00', r0}, 0x10) [ 227.140421][ T9296] lockdep_hardirqs_on_prepare+0x5e/0x450 [ 227.146256][ T9296] trace_hardirqs_on+0x5b/0x1c0 [ 227.151132][ T9296] __bad_area_nosemaphore+0xc6/0x4f0 [ 227.156432][ T9296] do_user_addr_fault+0x852/0xbf0 [ 227.161489][ T9296] exc_page_fault+0xa8/0x190 [ 227.166098][ T9296] ? asm_exc_page_fault+0x8/0x30 [ 227.171051][ T9296] asm_exc_page_fault+0x1e/0x30 [ 227.175916][ T9296] RIP: 0033:0x43c496 [ 227.179833][ T9296] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 227.199460][ T9296] RSP: 002b:00007f62af0e1a88 EFLAGS: 00010293 [ 227.205557][ T9296] RAX: 0000000000000000 RBX: 00007f62af0e1b20 RCX: 0000000000000000 [ 227.213984][ T9296] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 227.221974][ T9296] RBP: 00007f62af0e1ae0 R08: 0000000020006870 R09: 0000000000000000 [ 227.229961][ T9296] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 227.237949][ T9296] R13: 0000000000000000 R14: 0000000020006840 R15: 0000000000000000 [ 227.246896][ T9296] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.1/9296 [ 227.256559][ T9296] caller is lockdep_hardirqs_on+0x34/0x110 [ 227.262390][ T9296] CPU: 1 PID: 9296 Comm: syz-executor.1 Not tainted 5.9.0-next-20201016-syzkaller #0 [ 227.271852][ T9296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.281923][ T9296] Call Trace: [ 227.285238][ T9296] dump_stack+0x198/0x1fb [ 227.289596][ T9296] check_preemption_disabled+0x128/0x130 [ 227.295252][ T9296] ? __bad_area_nosemaphore+0xc6/0x4f0 [ 227.300738][ T9296] lockdep_hardirqs_on+0x34/0x110 [ 227.305801][ T9296] __bad_area_nosemaphore+0xc6/0x4f0 [ 227.311109][ T9296] do_user_addr_fault+0x852/0xbf0 [ 227.316179][ T9296] exc_page_fault+0xa8/0x190 [ 227.320789][ T9296] ? asm_exc_page_fault+0x8/0x30 [ 227.325738][ T9296] asm_exc_page_fault+0x1e/0x30 [ 227.330601][ T9296] RIP: 0033:0x43c496 [ 227.334508][ T9296] Code: 00 0f 1f 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 227.354136][ T9296] RSP: 002b:00007f62af0e1a88 EFLAGS: 00010293 [ 227.360246][ T9296] RAX: 0000000000000000 RBX: 00007f62af0e1b20 RCX: 0000000000000000 [ 227.368217][ T9296] RDX: 0000000000000003 RSI: 00000000000001ff RDI: 0000000000000000 [ 227.376190][ T9296] RBP: 00007f62af0e1ae0 R08: 0000000020006870 R09: 0000000000000000 [ 227.384171][ T9296] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 01:08:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) [ 227.392146][ T9296] R13: 0000000000000000 R14: 0000000020006840 R15: 0000000000000000 01:08:13 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) [ 227.537614][ T9283] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:13 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 227.994973][ T9329] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:14 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:14 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10) bind$vsock_stream(r0, &(0x7f0000000000), 0x10) [ 228.472866][ T21] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:14 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:14 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:14 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0x1e, &(0x7f0000000000)={0x4}, 0x8) 01:08:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r3, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r2) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r3) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:14 executing program 1: socket$nl_rdma(0x10, 0x3, 0x14) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) [ 228.779011][ T9373] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:14 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000280)='./file0\x00', 0x1f1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, 0x0, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:15 executing program 1: socket$unix(0x1, 0x1, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) [ 229.155081][ T143] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 229.173453][ T9380] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, 0x0, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:15 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, 0x0, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000280)='./file0\x00', 0x1f1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:15 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:15 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) write$char_usb(r0, 0x0, 0x0) 01:08:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000280)='./file0\x00', 0x1f1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r1, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) [ 229.726906][ T9414] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:15 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000020c0)={0x5f}, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000002380)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002340)={&(0x7f0000002180)={0x1a4, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x3c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="fb62ea50fef88776974374b382d5b2aae41a87ec46e1794f20b0074ba30f0eed"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1ff}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "71286e6cc10c7d4a"}]}, @NL80211_ATTR_REKEY_DATA={0x58, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="bf1d257aac2d2b1b7d90a28384430d0a0fd0fddc8676304e"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="8bbe6daca9eb7fd90958aa0fe5ca5a07"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="dd1e7d481e9a903fb43080d1a27724a3f385bffe566bc5a2"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x9}]}, @NL80211_ATTR_REKEY_DATA={0xd4, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="865f26dea6e72309b29bb7af84167dae"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="0d4ff2a508baddeb170f0ba55613d0952d0e009e4e5168abdc35006c6484d872"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x2}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="baee11241ed47838d683dfb540714964b6e409e7b3812e5a"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "813fb153312a2e87"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="b6fd90218a1f2df532ca6739d38888f9efc97512570b3aa7398fbcec53ab970e"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f426b84c667da4e2991718bdaba047d6327373e239be96a6"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "acdf1731e54f69d4"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="be44b3768f46aa9d6bd5a329c68981ad"}]}, @NL80211_ATTR_REKEY_DATA={0x20, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="7b619799c85e0a3654b79a8a1e6e8c60"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x7}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_mount_image$vfat(&(0x7f00000065c0)='vfat\x00', &(0x7f0000006600)='./file0\x00', 0x0, 0x2, &(0x7f0000006840)=[{&(0x7f0000006640)="9e41feb1bd7fff2ad89a2985aa33d3d9d59ca402508e61e08f3397109f3442e4bc8ab448268c1dd91d933536f217885db8cf24979e59ae4fae2482716a71b558b9ea6f7bbdfb63ccfa4fd57f5030c025a42bb63705ff78a02e68c4b4070943348a5b3ae16554775000a5a4a3d72f0713da2ecbd974235205502e401e1c7690ebac0c62b64371cb26e81b9c55a1a8c67173d6be37f310c9234acc612977e5cbcc889b98de0c9b59648b115bc403c0da6e8551a19562e14ca20c344a39d13fa2f78a4f33700868b3026f5d456af3d15d60", 0xd0, 0x78d2}, {&(0x7f0000006740)="c56f0cfdb4c4f6668d01fcd9f5bbf4a217533cb6af99862f2c4787a13566c523e7b04aa15f907929e82bd3e415a37cfd515ed868810875c5de66fef0498e8f7e336d5db402332e81ba71e128e861cee5eb41ca62ca0ed18df4b831781a8f1b2456c112457e8f82375d6a26e2a73f789995c875ac5d9248a75ccf699371121cd8532846cd7019cae3029e83a45b394680815fa8511966fecf1d1a24eb1e3f551e6c0b83e08b9462be373153d3b6d9fc0e584f02c5f9bfa19064269d43ab8fa6604fcc31ef710edfac6261ba9a4ad0fa144d4731c3f9dc4d835db3d817bafc24dab9cf3a15920910", 0xe7, 0x4}], 0x1205028, &(0x7f0000006880)={[{@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'cp437'}}, {@iocharset={'iocharset', 0x3d, 'cp874'}}], [{@hash='hash'}, {@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) open(&(0x7f0000006900)='./file0\x00', 0xa000, 0x40) 01:08:15 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r1, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) [ 229.890960][ T9433] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=/:file0']) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x29d021, 0x0) 01:08:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:16 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:16 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r1, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) [ 230.164655][ T143] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:16 executing program 1: pselect6(0x39, &(0x7f0000000040), 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) 01:08:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) [ 230.599302][ T9474] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 230.622748][ T9466] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 01:08:16 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:17 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f0000000200)=""/255, 0x32, 0xff, 0x1}, 0x20) 01:08:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000007c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x40004007fff, 0x32fe3cf2}, 0x14) sendfile(r1, r0, 0x0, 0x10000edbe) 01:08:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 231.352603][ T9500] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:17 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:17 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syz_open_dev$ptys(0xc, 0x3, 0x1) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:17 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:17 executing program 1: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') mlockall(0x2) r1 = memfd_create(&(0x7f0000000080)='\x15\xf7^\xf9\x12\x0f\xbd+\xa7\xce\xfa%\x98\xc6\x1e\x1e\xf8\x0213\xce\x89x\xb6\x9b\xfbp\x9f\xd5\x9d\b\xb7\x1b\xcc\x91\xc9\x12\xb01\xa8\x1e\xdb\xea+\xfd\x8d\xe7\xdc\x90\x90\xa8\x1a\xa6%\xc2\x85d?\x15W\xc0\xb9\xfb\x01&\xbb\xce6\xe7\x96\xf2\xf5\n!\xc5\xe2\xef\xce\xff\xec\xac9\x98\xb4<\xc5|\x0e\xae', 0x200) ftruncate(r1, 0x800799c) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xad158a7b0bd0246c, 0x13, r1, 0x0) ftruncate(r1, 0xff0f) preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0, 0x0) 01:08:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r1) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:17 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r1) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 01:08:18 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) [ 231.927358][ T9554] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1f1) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r1) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 232.252184][ T9540] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 01:08:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4409bb223e6dee06f602e496931cd4f4", 0x10}], 0x1}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="8517b711db8cb83cf382acc8c439d9e0", 0x10}], 0x1}}], 0x2, 0x0) 01:08:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r2, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}]}, 0x30}}, 0x0) 01:08:18 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="6e66732c00a1e7a6bdc96b68516be184b3370c75661a6a4c54db3674a02a06a3b738d2ce593292c83f848108d434f6a445e839d40edd6398857f2dd00d16e67a03e68afa7f87a54abc35c476b7078bcbc385b0da7cbfc4395b32d6668b1fa9e7e5004d96039a2963b3540b21c7b93d35de4aebaf65e5c3c1a1e448bc22bc9c0be781d57298914566d442a75785a519d6adfee549cf4a42aeeeedb3a3bc18c09b3aaa5e4165413cc661fd70f59b9e1f8e87f7c7a5d43a3aa589ff26ec748651583f4fd5057bed8166b47334aee2473fc93c1c11337581203256998be797430be4299e1e3a52537d9bb5a44068d95779102aeb98c65b43457fc0102f9e2cf399d49a662f7b829376065d8e14c74b7dfb74e6be8208d490fb88a6bd6023b00a0760b539b062670ae5f7d1e242ece1608e17b5cbd0a051555a11c5b0f6370000"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xfffffffffffffc01, 0x50, [], 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v2={0x2000000, [{0x9, 0x3}, {0x9}]}, 0x14, 0x1) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) open(&(0x7f00000001c0)='./file0\x00', 0x44080, 0x8) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:18 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x2) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc0000b, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800090000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000580)='y\x00', 0x2, 0x2) preadv(r3, &(0x7f00000012c0), 0x1000000000000150, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) syz_open_dev$ptys(0xc, 0x3, 0x1) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000005c0), &(0x7f0000000600)=0x4) unlinkat(r1, &(0x7f0000001580)='./file0\x00', 0x200) 01:08:18 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0/file0\x00'}, 0x6e)