ile0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 19:59:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000424, 0x1) write(r1, &(0x7f00000009c0)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xfec) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) [ 251.132258][T11744] relay: one or more items not logged [item size (56) > sub-buffer size (3)] [ 251.279394][T11754] relay: one or more items not logged [item size (56) > sub-buffer size (3)] 19:59:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x0) write$9p(r1, &(0x7f0000000e00)="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", 0x600) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) 19:59:13 executing program 2: ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:59:13 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:13 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:13 executing program 1: open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) getpid() ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 19:59:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) [ 253.440322][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 253.440333][ T26] audit: type=1800 audit(1554235153.407:109): pid=11767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17032 res=0 19:59:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x0) write$9p(r1, &(0x7f0000000e00)="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", 0x600) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) 19:59:13 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 253.569508][ T26] audit: type=1326 audit(1554235153.467:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11762 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x0 19:59:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x0) write$9p(r1, &(0x7f0000000e00)="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", 0x600) sendfile(r1, r2, 0x0, 0x0) [ 253.698092][ T26] audit: type=1326 audit(1554235153.477:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11764 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x0 19:59:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:13 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 253.835311][ T26] audit: type=1800 audit(1554235153.617:112): pid=11782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16995 res=0 19:59:13 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 254.023563][ T26] audit: type=1800 audit(1554235153.847:113): pid=11795 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16995 res=0 19:59:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000000)=0x273) 19:59:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x0) write$9p(r1, &(0x7f0000000e00)="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", 0x600) sendfile(r1, r2, 0x0, 0x0) [ 254.269189][ T26] audit: type=1326 audit(1554235154.237:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11764 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x0 [ 254.390522][ T26] audit: type=1800 audit(1554235154.307:115): pid=11817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17032 res=0 19:59:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_emit_ethernet(0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) 19:59:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x0) write$9p(r1, &(0x7f0000000e00)="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", 0x600) sendfile(r1, r2, 0x0, 0x0) 19:59:14 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000000)=0x273) [ 254.439280][ T26] audit: type=1326 audit(1554235154.337:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11762 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0x0 19:59:14 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) [ 254.564312][ T26] audit: type=1800 audit(1554235154.537:117): pid=11835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17034 res=0 19:59:14 executing program 1: accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, &(0x7f0000000180)=0x80, 0x800) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) r0 = shmget$private(0x0, 0x2000, 0x204, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000380)=""/142) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r1, 0x409, 0x8) 19:59:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 19:59:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:14 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000000)=[@increfs], 0x0, 0x0, 0x0}) 19:59:14 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 254.863254][T11862] binder: 11861:11862 IncRefs 0 refcount change on invalid ref 0 ret -22 19:59:14 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000000)=[@increfs], 0x0, 0x0, 0x0}) 19:59:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:15 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 255.047809][T11873] binder: 11869:11873 IncRefs 0 refcount change on invalid ref 0 ret -22 19:59:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5820000000000000000a5ddf7006c210244343a0f", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6cf1, 0x0, 0x0, 0x6174) 19:59:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:59:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:15 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x5) creat(0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{}], {0x10, 0x2}}, 0x2c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 19:59:15 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) 19:59:15 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) unlink(&(0x7f00000000c0)='./file0\x00') fremovexattr(0xffffffffffffffff, 0x0) creat(0x0, 0x0) 19:59:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:15 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd8", 0x2}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) ioctl$LOOP_CLR_FD(r2, 0x4c01) [ 255.793587][T11913] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:59:15 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 19:59:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:16 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') unlink(0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1000, 0x0) 19:59:16 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:16 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x5) creat(0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{}], {0x10, 0x2}}, 0x2c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) [ 256.045993][ T26] audit: type=1804 audit(1554235156.017:118): pid=11942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir737283740/syzkaller.SCvt9c/221/file0" dev="sda1" ino=17045 res=1 19:59:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) [ 256.108555][T11942] Unable to find swap-space signature 19:59:16 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:59:16 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000440)='ramfs\x00', 0x800050, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") chdir(&(0x7f00000001c0)='./file0\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) 19:59:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000240)={0x0, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000004c0)=[{r3}], 0x1, 0x0, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl(r0, 0x2000001000008912, &(0x7f0000000200)="0adc1f123c123f3188b070") 19:59:16 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:16 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 19:59:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:16 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 19:59:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="048a1e250e5ba419e2b29bf8ab1c8349feb291e3925ab48aa70e86cd08b00d3fdf08fbcbae"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2b) fcntl$setstatus(r1, 0x4, 0x42803) 19:59:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:16 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x222, 0x2) 19:59:17 executing program 1: keyctl$join(0x1, 0x0) request_key(&(0x7f0000000040)='user\x00\xbc\xa4\xce\xf4\xefrX\xa2\\\x00\x1f\xe3\xe1\xfe\xea\xa7&\xb9xs\xd0\xc4v\x93e\x92\xd7\xb6N*:\xd5v`\x8c\xeb^', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 19:59:17 executing program 4: getresgid(0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigreturn() setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f00000007c0)={0x100000001}, 0x0) 19:59:17 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:17 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:17 executing program 1: getresgid(0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigreturn() setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f00000007c0), 0x0) 19:59:17 executing program 4: getresgid(0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) rt_sigreturn() setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f00000007c0)={0x0, 0x3}, 0x0) 19:59:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x05\x00\x00\x10\x00', 0x803}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x31e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 19:59:17 executing program 4: getresgid(0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f00000007c0), 0x0) 19:59:19 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:19 executing program 2: 19:59:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:19 executing program 4: 19:59:19 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:19 executing program 1: 19:59:19 executing program 2: 19:59:19 executing program 1: 19:59:19 executing program 4: 19:59:19 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffed5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x80000) connect$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:20 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000240), 0x1b7, 0x40000, 0x0, 0x200) 19:59:20 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'rose0\x00', 0x800000000000002}) 19:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:20 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x0, @dev, 0x0, 0x0, 'lc\x00'}, 0x2c) 19:59:20 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:20 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$inet6(r0, 0x0, &(0x7f00000000c0)) 19:59:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0xded, 0x4) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 19:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:20 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0x5) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:59:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 19:59:20 executing program 4: r0 = memfd_create(&(0x7f0000000600)='\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0xa3}, 0x2e2) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) io_setup(0x3f, &(0x7f0000000080)) io_setup(0x5b3, &(0x7f0000000040)) 19:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:20 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:20 executing program 4: clock_nanosleep(0x0, 0xffffffffffffffff, &(0x7f00000000c0)={0x77359400}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = gettid() tkill(r0, 0x1000000000016) 19:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:20 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:20 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:20 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'bpq0\x00\x00\x06\xe0\xff\x00\x00\b\x00', 0x1}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e1, &(0x7f0000000040)) 19:59:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:21 executing program 2: 19:59:21 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)) 19:59:21 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:21 executing program 1: 19:59:21 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:21 executing program 1: 19:59:21 executing program 4: 19:59:21 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:21 executing program 2: 19:59:21 executing program 1: 19:59:21 executing program 4: 19:59:23 executing program 1: 19:59:23 executing program 2: 19:59:23 executing program 4: 19:59:23 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:23 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:24 executing program 4: 19:59:24 executing program 1: 19:59:24 executing program 2: 19:59:24 executing program 1: 19:59:24 executing program 2: 19:59:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:24 executing program 4: 19:59:24 executing program 1: 19:59:24 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:24 executing program 2: 19:59:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:24 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:24 executing program 4: 19:59:24 executing program 1: 19:59:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:24 executing program 4: [ 264.612071][ T26] audit: type=1800 audit(1554235164.577:119): pid=12261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17059 res=0 19:59:24 executing program 2: 19:59:24 executing program 1: 19:59:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:24 executing program 4: 19:59:25 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:25 executing program 1: 19:59:25 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:25 executing program 2: 19:59:25 executing program 4: 19:59:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) [ 265.115713][ T26] audit: type=1800 audit(1554235165.087:120): pid=12295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17070 res=0 19:59:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:25 executing program 2: 19:59:25 executing program 1: 19:59:25 executing program 4: 19:59:25 executing program 4: 19:59:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:25 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 19:59:25 executing program 4: 19:59:25 executing program 1: 19:59:25 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:25 executing program 2: 19:59:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:25 executing program 4: 19:59:25 executing program 2: 19:59:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:25 executing program 1: [ 265.694426][ T26] audit: type=1800 audit(1554235165.667:121): pid=12331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17077 res=0 19:59:25 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 19:59:25 executing program 4: 19:59:25 executing program 2: 19:59:25 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:25 executing program 4: 19:59:25 executing program 1: 19:59:25 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) 19:59:26 executing program 2: 19:59:26 executing program 1: 19:59:26 executing program 4: 19:59:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:26 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:26 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:26 executing program 2: 19:59:26 executing program 4: 19:59:26 executing program 1: 19:59:26 executing program 1: 19:59:26 executing program 2: 19:59:26 executing program 4: 19:59:26 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:26 executing program 4: 19:59:26 executing program 2: 19:59:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:26 executing program 1: 19:59:26 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:26 executing program 4: 19:59:26 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:26 executing program 2: 19:59:26 executing program 1: 19:59:26 executing program 4: 19:59:26 executing program 2: 19:59:26 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:26 executing program 1: 19:59:26 executing program 4: 19:59:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:27 executing program 2: 19:59:27 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:27 executing program 4: 19:59:27 executing program 1: 19:59:27 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:27 executing program 4: 19:59:27 executing program 2: 19:59:27 executing program 1: 19:59:27 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:27 executing program 4: 19:59:27 executing program 1: [ 267.374379][ T26] audit: type=1800 audit(1554235167.347:122): pid=12465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17097 res=0 19:59:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:27 executing program 2: 19:59:27 executing program 4: 19:59:27 executing program 1: 19:59:27 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) [ 267.627013][T12465] syz-executor.0 (12465) used greatest stack depth: 22360 bytes left 19:59:27 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:27 executing program 4: 19:59:27 executing program 1: [ 267.722151][ T26] audit: type=1800 audit(1554235167.687:123): pid=12483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17098 res=0 19:59:27 executing program 2: 19:59:27 executing program 4: [ 267.839143][ T26] audit: type=1800 audit(1554235167.717:124): pid=12480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17097 res=0 19:59:27 executing program 1: 19:59:27 executing program 2: 19:59:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:28 executing program 1: 19:59:28 executing program 4: 19:59:28 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:28 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) 19:59:28 executing program 2: 19:59:28 executing program 2: [ 268.222402][ T26] audit: type=1800 audit(1554235168.187:125): pid=12514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17105 res=0 19:59:28 executing program 4: 19:59:28 executing program 1: [ 268.308715][ T26] audit: type=1800 audit(1554235168.187:126): pid=12513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17106 res=0 19:59:28 executing program 2: 19:59:28 executing program 1: 19:59:28 executing program 4: 19:59:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:28 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) 19:59:28 executing program 2: 19:59:28 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:28 executing program 1: 19:59:28 executing program 4: 19:59:28 executing program 1: 19:59:28 executing program 2: [ 268.724975][ T26] audit: type=1800 audit(1554235168.697:127): pid=12539 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17104 res=0 19:59:28 executing program 4: [ 268.811155][ T26] audit: type=1804 audit(1554235168.697:128): pid=12541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir003392966/syzkaller.YDa0zD/260/file0" dev="sda1" ino=17107 res=1 19:59:28 executing program 1: 19:59:28 executing program 4: 19:59:28 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:29 executing program 2: 19:59:29 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:29 executing program 1: 19:59:29 executing program 4: 19:59:29 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:29 executing program 2: 19:59:29 executing program 1: 19:59:29 executing program 4: 19:59:29 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:29 executing program 1: 19:59:29 executing program 4: 19:59:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:29 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:29 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:29 executing program 2: 19:59:29 executing program 1: 19:59:29 executing program 4: 19:59:29 executing program 1: 19:59:29 executing program 4: 19:59:29 executing program 2: [ 269.696280][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 269.696293][ T26] audit: type=1804 audit(1554235169.667:130): pid=12608 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir003392966/syzkaller.YDa0zD/262/file0" dev="sda1" ino=17090 res=1 19:59:29 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:29 executing program 1: 19:59:29 executing program 2: 19:59:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:30 executing program 4: 19:59:30 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:30 executing program 1: 19:59:30 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:30 executing program 2: 19:59:30 executing program 1: 19:59:30 executing program 4: 19:59:30 executing program 2: 19:59:30 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:30 executing program 2: 19:59:30 executing program 4: [ 270.298870][ T26] audit: type=1800 audit(1554235170.267:131): pid=12654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17130 res=0 19:59:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:30 executing program 1: 19:59:30 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:30 executing program 2: 19:59:30 executing program 4: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000000200)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x1000, 0x0) 19:59:30 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)=ANY=[@ANYBLOB="020300000f000000000000000000000005000600000000000a000000000000000000000000000000000000000000000000000000000000000100180000aaf15af64242b69a45d5a8503d80f8bf0000000200010000000000000000000000000005000500000000000a00000000000000fe80000000000000"], 0x78}}, 0x0) 19:59:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x85) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) dup3(r1, r0, 0x0) write(r1, &(0x7f0000000380), 0xfffffffe) [ 270.621640][ T26] audit: type=1800 audit(1554235170.587:132): pid=12670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17126 res=0 19:59:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x200000000001, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) 19:59:30 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:30 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000000016, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$peek(0x2, r0, &(0x7f0000000080)) 19:59:30 executing program 4: mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) clone(0x210007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{}]}) [ 270.872610][ T26] audit: type=1800 audit(1554235170.837:133): pid=12697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17126 res=0 19:59:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:31 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:31 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff09fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 19:59:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) 19:59:31 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 271.169038][ T26] audit: type=1804 audit(1554235171.137:134): pid=12714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir830995381/syzkaller.HSttjp/256/file0" dev="sda1" ino=17137 res=1 19:59:31 executing program 1: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x4, &(0x7f0000000380)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000200), 0xfffffd07}]) io_setup(0xff, &(0x7f0000000140)) 19:59:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ftruncate(r1, 0x3fffd) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 19:59:31 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x4000) io_setup(0x4, &(0x7f0000000380)=0x0) io_submit(r5, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000200), 0xfffffd07}]) io_setup(0xff, &(0x7f0000000140)=0x0) io_getevents(r6, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) 19:59:31 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 271.410598][ T26] audit: type=1804 audit(1554235171.377:135): pid=12736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir830995381/syzkaller.HSttjp/257/file0" dev="sda1" ino=17137 res=1 19:59:31 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:31 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x0, 0xfffffffffffffffd, 0x208) 19:59:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffebb) 19:59:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') [ 271.747450][ T26] audit: type=1804 audit(1554235171.717:136): pid=12756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir830995381/syzkaller.HSttjp/258/file0" dev="sda1" ino=17121 res=1 19:59:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 19:59:31 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:31 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:32 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:32 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [0x100000000002ff, 0x9]}) 19:59:32 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [0x10000000000010]}) 19:59:32 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffebb) 19:59:32 executing program 2: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) 19:59:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) lsetxattr$security_capability(0x0, 0x0, &(0x7f00000001c0), 0xc, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000009ad39b5b42845b86f6b6d9"], 0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x5) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000340)) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) close(r2) 19:59:33 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:33 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:33 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:33 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:33 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:33 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:33 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffebb) 19:59:33 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:34 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) 19:59:34 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:34 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:34 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:34 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000100) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) 19:59:34 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) 19:59:34 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:34 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0xfffffffffffffebb) 19:59:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:35 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:35 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:35 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:35 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000100) lseek(r0, 0x0, 0x3) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) 19:59:35 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) [ 275.440957][ T26] audit: type=1804 audit(1554235175.407:137): pid=12989 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir003392966/syzkaller.YDa0zD/278/file0" dev="sda1" ino=17150 res=1 19:59:35 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:35 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 275.694436][ T26] audit: type=1804 audit(1554235175.667:138): pid=13001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir003392966/syzkaller.YDa0zD/279/file0" dev="sda1" ino=17160 res=1 19:59:35 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) [ 275.941562][ T26] audit: type=1804 audit(1554235175.907:139): pid=13009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir003392966/syzkaller.YDa0zD/280/file0" dev="sda1" ino=17132 res=1 19:59:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:36 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:36 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:36 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) 19:59:36 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:36 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:36 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x3000000000016) 19:59:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:36 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:36 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:36 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:37 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:37 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:37 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:37 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:37 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:37 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000009ad39b5b1a6d23fbf6b6d9"], 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) close(r1) 19:59:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:37 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:37 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:38 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:38 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:38 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) [ 278.179660][T13110] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 278.224129][ T26] audit: type=1804 audit(1554235178.197:140): pid=13115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir830995381/syzkaller.HSttjp/274/file0" dev="sda1" ino=17164 res=1 [ 278.261475][T13101] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 278.308046][T13110] FAT-fs (loop1): Filesystem has been set read-only [ 278.337833][T13101] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 19:59:38 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 278.478148][T13110] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 278.536987][T13101] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 19:59:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) 19:59:38 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000009ad39b5b1a6d23fbf6b6d9"], 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) close(r1) 19:59:38 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:38 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) [ 278.972110][T13147] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 19:59:39 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 279.090988][T13138] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 279.102916][T13147] FAT-fs (loop1): Filesystem has been set read-only 19:59:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) [ 279.148994][T13138] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 279.194642][ T26] audit: type=1804 audit(1554235179.167:141): pid=13159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir830995381/syzkaller.HSttjp/275/file0" dev="sda1" ino=17164 res=1 19:59:39 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:59:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000009ad39b5b1a6d23fbf6b6d9"], 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) close(r1) 19:59:39 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 279.741462][T13187] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 19:59:39 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 279.832743][T13187] FAT-fs (loop1): Filesystem has been set read-only [ 279.870693][T13181] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 19:59:39 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) [ 279.923767][T13181] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 19:59:40 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 280.085118][ T26] audit: type=1804 audit(1554235180.057:142): pid=13201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir830995381/syzkaller.HSttjp/276/file0" dev="sda1" ino=17164 res=1 19:59:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:59:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/250) 19:59:40 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:40 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:40 executing program 1: seccomp(0x200000001, 0x0, 0x0) timer_create(0x3, &(0x7f0000000100)={0x0, 0x24, 0x1, @thr={&(0x7f0000000040)="48055ec735e8dcd057d5e19527642b71db66fd06dd4e601494841867c0b6df0a52cc5635d0711d5a15ae7e7c682406b07c0a1fd93cce79760c5fa9b315c108af3a8f4c0848d9fd8bbee88d217767694084c9f579e91d2c5e6a89786744c1f7a584649c98b5665bdb29d647d02cb66d", 0x0}}, &(0x7f0000000140)=0x0) timer_settime(r0, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000300)) 19:59:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:59:40 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:40 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000180)=""/66) 19:59:40 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:41 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 19:59:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r1, 0xa, 0x27) r2 = fcntl$dupfd(r0, 0x0, r1) getpgid(0x0) ioctl(r1, 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000100), 0x10) 19:59:41 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:41 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) getsockname(r0, &(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000440)=0x80) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) dup2(r0, r1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x17a, 0x0, 0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x0, 0x0, 0x0) 19:59:41 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(0x0, 0xfffffeca, 0x0) r2 = dup3(r1, r0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000040)=@dstopts, 0x8) 19:59:41 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:41 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:41 executing program 1: 19:59:41 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:42 executing program 1: 19:59:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 19:59:42 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:42 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:42 executing program 1: 19:59:42 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:42 executing program 1: 19:59:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:42 executing program 1: 19:59:42 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:42 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:42 executing program 1: 19:59:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 19:59:42 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:42 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) select(0x0, 0x0, 0x0, 0x0, 0x0) 19:59:43 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) [ 283.141615][ T26] audit: type=1326 audit(1554235183.107:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13365 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 19:59:43 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:43 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) munmap(&(0x7f0000e00000/0x200000)=nil, 0x200000) 19:59:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 19:59:43 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 283.551840][ T26] audit: type=1326 audit(1554235183.517:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13394 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:43 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 19:59:43 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) [ 283.889897][ T26] audit: type=1326 audit(1554235183.857:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13365 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:43 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) chown(0x0, 0x0, 0x0) 19:59:44 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000800)) [ 284.120147][ T26] audit: type=1326 audit(1554235184.087:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13422 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:44 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 284.337281][ T26] audit: type=1326 audit(1554235184.307:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13394 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:44 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) getcwd(&(0x7f0000000100)=""/74, 0x4a) 19:59:44 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000800)) [ 284.480549][ T26] audit: type=1326 audit(1554235184.447:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13435 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:44 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000800)) 19:59:44 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:44 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, 0x0) 19:59:44 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) [ 284.912856][ T26] audit: type=1326 audit(1554235184.877:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13422 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:44 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, 0x0) 19:59:44 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) creat(&(0x7f0000000240)='./file1\x00', 0x0) unlink(&(0x7f0000000080)='./file1\x00') [ 285.064322][ T26] audit: type=1326 audit(1554235185.037:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13464 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:45 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:45 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, 0x0) [ 285.277486][ T26] audit: type=1326 audit(1554235185.247:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13435 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysfs$2(0x2, 0x4, &(0x7f00000004c0)=""/219) 19:59:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:45 executing program 0: 19:59:45 executing program 0: 19:59:45 executing program 5: 19:59:45 executing program 5: 19:59:45 executing program 0: 19:59:45 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) write$binfmt_aout(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="060779d4f7a5a6a4176048d8ddd8563560ae5dfba958627be3d6f6a113ad25e3bb01729447c1a53c713480fef7f181d5f70f84101e69692521e9c4fce67e9d3d03a43364e9a5cd7c5385d10fddb9ef63be4b54421e06675d8513"], 0x5a) write$cgroup_int(r1, &(0x7f0000000000), 0x1fff) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000200)=""/115, 0x73}, {&(0x7f0000000400)=""/62, 0x3e}], 0x2) [ 285.844035][ T26] audit: type=1326 audit(1554235185.817:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13464 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:45 executing program 1: 19:59:45 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:45 executing program 0: 19:59:45 executing program 5: 19:59:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:46 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:46 executing program 0: 19:59:46 executing program 5: 19:59:46 executing program 1: 19:59:46 executing program 1: 19:59:46 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(0x0, 0x0, 0x13) 19:59:46 executing program 5: 19:59:46 executing program 0: 19:59:46 executing program 1: 19:59:46 executing program 5: 19:59:46 executing program 0: 19:59:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:47 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:47 executing program 5: 19:59:47 executing program 1: 19:59:47 executing program 0: 19:59:47 executing program 1: 19:59:47 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(0x0, 0x0, 0x13) 19:59:47 executing program 5: 19:59:47 executing program 0: 19:59:47 executing program 0: 19:59:47 executing program 5: 19:59:47 executing program 1: 19:59:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:48 executing program 5: 19:59:48 executing program 0: 19:59:48 executing program 1: 19:59:48 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:48 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(0x0, 0x0, 0x13) 19:59:48 executing program 0: 19:59:48 executing program 1: 19:59:48 executing program 5: 19:59:48 executing program 5: 19:59:48 executing program 0: 19:59:48 executing program 1: 19:59:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:49 executing program 0: 19:59:49 executing program 5: 19:59:49 executing program 1: 19:59:49 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2], 0x82) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:49 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:49 executing program 5: 19:59:49 executing program 0: 19:59:49 executing program 1: 19:59:49 executing program 0: 19:59:49 executing program 5: 19:59:49 executing program 1: 19:59:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:50 executing program 0: 19:59:50 executing program 1: 19:59:50 executing program 5: 19:59:50 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2], 0x82) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:50 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:50 executing program 5: 19:59:50 executing program 0: 19:59:50 executing program 1: 19:59:50 executing program 0: 19:59:50 executing program 5: 19:59:50 executing program 1: 19:59:51 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000500)={@local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev={0xac, 0x30}, {[@rr={0x7, 0x3, 0x1ff}, @rr={0x7, 0x3}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 19:59:51 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140), 0x4) 19:59:51 executing program 1: 19:59:51 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2], 0x82) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 19:59:51 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:51 executing program 5: 19:59:51 executing program 1: 19:59:51 executing program 1: 19:59:51 executing program 5: 19:59:51 executing program 0: 19:59:51 executing program 1: 19:59:51 executing program 5: 19:59:51 executing program 0: 19:59:51 executing program 1: 19:59:51 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32], 0x7e) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:52 executing program 1: 19:59:52 executing program 5: 19:59:52 executing program 0: 19:59:52 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:52 executing program 2: wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:52 executing program 1: 19:59:52 executing program 0: 19:59:52 executing program 5: 19:59:52 executing program 1: socket$inet6(0xa, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x2000000000207) pipe(&(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 19:59:52 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662"], 0x7a) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:52 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) listen(0xffffffffffffffff, 0x0) 19:59:52 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x7}, 0x0) 19:59:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) [ 292.416683][ T26] audit: type=1326 audit(1554235192.387:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:52 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) epoll_create1(0x0) [ 292.705449][ T26] audit: type=1326 audit(1554235192.677:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13766 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:52 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x7}, 0x0) 19:59:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) io_setup(0x40000000000001, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 19:59:52 executing program 2: wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:52 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662"], 0x7a) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:52 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:53 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000400)={0x1, 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x0) ioctl$FICLONE(r2, 0x40049409, r1) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) clock_gettime(0x1, &(0x7f0000000340)) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)) [ 293.184431][ T26] audit: type=1326 audit(1554235193.157:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13751 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:53 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) lgetxattr(0x0, 0x0, 0x0, 0x0) [ 293.303730][ T26] audit: type=1326 audit(1554235193.277:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13792 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 293.398172][T13797] IPVS: ftp: loaded support on port[0] = 21 19:59:53 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662"], 0x7a) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 293.491025][ T26] audit: type=1326 audit(1554235193.457:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13766 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 293.527048][T13801] IPVS: ftp: loaded support on port[0] = 21 19:59:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) 19:59:53 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000400)={0x1, 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x0) ioctl$FICLONE(r2, 0x40049409, r1) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) clock_gettime(0x1, &(0x7f0000000340)) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)) 19:59:53 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01"], 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000280)=""/106, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) open(&(0x7f0000000340)='./bus\x00', 0x0, 0x40) creat(&(0x7f0000000380)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) socket(0x0, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xa, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0}) [ 293.784517][T13814] IPVS: ftp: loaded support on port[0] = 21 19:59:53 executing program 2: wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:53 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 293.907272][T13819] binder: 13817:13819 unknown command 1 [ 293.930011][T13819] binder: 13817:13819 ioctl c0306201 200000c0 returned -22 19:59:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 294.061596][T13819] binder: 13817:13819 transaction failed 29189/-22, size 0-0 line 2995 [ 294.101404][ T26] audit: type=1326 audit(1554235194.067:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13792 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 294.143964][T13819] binder: 13817:13819 unknown command 1 19:59:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f00000002c0)="0adc1f123c123f3188b070") r1 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) mq_getsetattr(r1, 0x0, &(0x7f0000356000)) [ 294.159692][ T26] audit: type=1804 audit(1554235194.127:159): pid=13832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir038695207/syzkaller.6SGw2R/322/bus" dev="sda1" ino=17280 res=1 [ 294.194412][T13819] binder: 13817:13819 ioctl c0306201 200000c0 returned -22 19:59:54 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 294.234812][ T3758] binder: undelivered TRANSACTION_ERROR: 29189 [ 294.285954][ T26] audit: type=1804 audit(1554235194.157:160): pid=13822 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir038695207/syzkaller.6SGw2R/322/bus" dev="sda1" ino=17280 res=1 19:59:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(0x0, 0xfffffffffffffe6d, 0x0) getpeername(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(r1, r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000280)={{0x0, @multicast1, 0x0, 0x3, 'wrr\x00', 0x2}, {@multicast1}}, 0x44) 19:59:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000100)={0x19980330}, 0x0) [ 294.449437][T13852] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 19:59:54 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000400)={0x1, 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000340)) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)={0x0, 0x0, 0x800}) 19:59:54 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) ppoll(0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 294.676126][ T26] audit: type=1326 audit(1554235194.637:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13859 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 19:59:54 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 294.882866][T13856] IPVS: ftp: loaded support on port[0] = 21 19:59:54 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:54 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 19:59:55 executing program 0: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) r0 = getpid() sched_getaffinity(r0, 0x8, &(0x7f0000000500)) [ 295.319253][ T26] audit: type=1326 audit(1554235195.287:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13886 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 295.482374][T13889] IPVS: ftp: loaded support on port[0] = 21 19:59:55 executing program 5: 19:59:55 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:55 executing program 5: 19:59:55 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:55 executing program 5: 19:59:58 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000400)={0x1, 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00', 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000340)) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000300)={0x0, 0x0, 0x800}) 19:59:58 executing program 5: 19:59:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:58 executing program 0: 19:59:58 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:58 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:58 executing program 5: 19:59:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)=0xd924) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x0, 0x0, 0xfffffffffffffffe}) [ 298.656764][T13930] IPVS: ftp: loaded support on port[0] = 21 19:59:58 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 19:59:58 executing program 0: syz_open_pts(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x11, r0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000100), 0xfffffdbc) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 19:59:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000140)) 19:59:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="e6", 0x1}], 0x1) 19:59:59 executing program 1: syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0xc, 0x0, &(0x7f0000000440)=[@free_buffer], 0x0, 0x0, 0x0}) 19:59:59 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x400000084, 0x0, 0x0, &(0x7f00000000c0), 0x0) 19:59:59 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 19:59:59 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:59 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) [ 299.343765][T13962] binder: 13960:13962 BC_FREE_BUFFER u0000000000000000 no match 19:59:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e61853167377400000100000000000000000000e4dbb77487e90104000000000040800000000000001b2300000503000018ee0000cc000000ac01000000000000104cd1e090e1fe916dd213aa334e92ccaf601695c4d7000010f1000010040002d32379b87c5ade6e27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b63012812d04b94d660aab341cfe8364422b866cd445d5d0f4d6715ba085900323e00000000000071cfe0a000d095f2e686b2fcfcbf8ad42e95261934c464f75cea52010023aeaabc047ddc6e124f84aa9ec82709282747ea89297cc8071488a5fe5d911dd9026102d0756f14c8a2a4a51764c4f1"], 0x1) [ 299.418492][T13966] binder: 13960:13966 BC_FREE_BUFFER u0000000000000000 no match 19:59:59 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:59 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 19:59:59 executing program 1: times(&(0x7f00000002c0)) 19:59:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) 19:59:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e61853167377400000100000000ecffe901040000000000408000000000cdd8a0762b34fb760800001b2300000503000018ee0000cc000000ac01000000000000104cd1e090e1fe916dd21baa334e92ccaf601695c4d7000010f1000010040002d32379b87c5ade6e27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b63012812d04b94d660aab866cd445d5d0f4d6715ba085900323e00000000000071cfe0a000d0e572f64858938bcc08"], 0x1) 19:59:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) clone(0x207, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x100001041, 0x0) execve(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) r1 = getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semget(0xffffffffffffffff, 0x3, 0x0) clone(0x2080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000280)=""/90, 0x5a}], 0x1, &(0x7f00000019c0)=[{&(0x7f0000001500)=""/212, 0xd4}], 0x1, 0x0) 19:59:59 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 19:59:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) io_setup(0x100000001, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 20:00:00 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:00 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a60080000000000000000300000000000000001fc41180b5989fad6e34821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380)=[{}], 0x40000000000019c, 0x3a, &(0x7f0000000200)={0x77359400}) 20:00:00 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) kexec_load(0x0, 0x0, 0x0, 0x0) 20:00:00 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:00 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) socket(0x4, 0x80000, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x80000001, 0x9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)) [ 300.373949][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.400788][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.410806][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 300.410818][ T26] audit: type=1326 audit(1554235200.377:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 300.429551][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.526223][ T26] audit: type=1326 audit(1554235200.377:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14032 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 300.534357][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.558977][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.568813][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.578497][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.588304][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 300.610516][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:00 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:00 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 300.630251][T14034] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 20:00:00 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:00 executing program 0: getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000001980)) 20:00:00 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:00 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:00 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000001040)='net/tcp6\x00') read$FUSE(r0, &(0x7f0000003180), 0xffffffffffffff3e) [ 300.952299][T14069] cgroup: fork rejected by pids controller in /syz2 20:00:01 executing program 0: syz_execute_func(&(0x7f00000000c0)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d87312660fd2323e0f1110d4b842419dcccc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) ptrace(0x11, r0) [ 301.170500][ T26] audit: type=1326 audit(1554235201.137:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14032 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:01 executing program 5: syz_execute_func(&(0x7f00000000c0)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d87312660fd2323e0f1110d4b842419dcccc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000180)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ptrace(0x11, r0) 20:00:01 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 301.306986][ T26] audit: type=1326 audit(1554235201.167:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14031 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") futex(&(0x7f00000001c0)=0x1, 0x0, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, 0x0) 20:00:01 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:01 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:01 executing program 1: syz_execute_func(&(0x7f0000000000)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setpriority(0x3, 0x0, 0x0) ptrace(0x11, r0) 20:00:01 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:01 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:01 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:02 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:02 executing program 0: syz_execute_func(&(0x7f0000000000)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) ptrace(0x11, r0) 20:00:02 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:04 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") futex(&(0x7f00000001c0)=0x1, 0x0, 0x1, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 20:00:04 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000), &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:04 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:04 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000), &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:04 executing program 1: 20:00:04 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:00:04 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000), &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:04 executing program 1: 20:00:04 executing program 1: syz_execute_func(&(0x7f0000000000)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x202c1, 0x0) 20:00:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") futex(&(0x7f00000001c0)=0x1, 0x0, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) 20:00:05 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:05 executing program 5: syz_execute_func(&(0x7f0000000000)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) ptrace(0x11, r0) 20:00:05 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 20:00:05 executing program 1: syz_execute_func(&(0x7f00000000c0)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d87312660fd2323e0f1110d4b842419dcccc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ptrace(0x11, r0) 20:00:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:05 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:05 executing program 0: 20:00:05 executing program 0: 20:00:05 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 20:00:05 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:05 executing program 0: 20:00:05 executing program 0: 20:00:05 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:08 executing program 5: 20:00:08 executing program 0: 20:00:08 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 20:00:08 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:08 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:08 executing program 1: 20:00:08 executing program 0: 20:00:08 executing program 1: 20:00:08 executing program 5: 20:00:08 executing program 0: 20:00:08 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:08 executing program 5: 20:00:08 executing program 1: 20:00:08 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) 20:00:08 executing program 0: 20:00:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:09 executing program 5: 20:00:09 executing program 1: 20:00:09 executing program 0: 20:00:09 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:09 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) 20:00:09 executing program 0: 20:00:09 executing program 5: 20:00:09 executing program 1: 20:00:09 executing program 1: 20:00:09 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:09 executing program 0: 20:00:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:10 executing program 5: 20:00:10 executing program 1: 20:00:10 executing program 0: 20:00:10 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x8800000) 20:00:10 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:10 executing program 5: 20:00:10 executing program 1: 20:00:10 executing program 0: 20:00:10 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:10 executing program 5: 20:00:10 executing program 1: 20:00:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:10 executing program 0: 20:00:10 executing program 1: 20:00:10 executing program 5: 20:00:10 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:10 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 20:00:11 executing program 5: 20:00:11 executing program 0: 20:00:11 executing program 1: 20:00:11 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:11 executing program 1: 20:00:11 executing program 5: 20:00:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:11 executing program 0: 20:00:11 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:11 executing program 1: 20:00:11 executing program 5: 20:00:11 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 20:00:11 executing program 5: 20:00:11 executing program 0: 20:00:12 executing program 1: 20:00:12 executing program 5: 20:00:12 executing program 0: 20:00:12 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:12 executing program 1: 20:00:12 executing program 5: 20:00:12 executing program 0: 20:00:12 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 20:00:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:12 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:12 executing program 0: 20:00:12 executing program 5: 20:00:12 executing program 1: [ 312.999666][T16390] FAT-fs (loop4): bogus number of reserved sectors 20:00:13 executing program 1: 20:00:13 executing program 0: 20:00:13 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) fchown(0xffffffffffffffff, 0x0, 0x0) [ 313.040070][T16390] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:13 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:13 executing program 0: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) set_robust_list(&(0x7f0000000080), 0x18) 20:00:13 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) timer_getoverrun(0x0) 20:00:13 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) [ 313.277412][ T26] audit: type=1326 audit(1554235213.247:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16456 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 313.419533][ T26] audit: type=1326 audit(1554235213.367:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16570 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 [ 313.448848][ T26] audit: type=1326 audit(1554235213.387:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:13 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:13 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) [ 313.874696][T16588] FAT-fs (loop4): bogus number of reserved sectors [ 313.897824][T16588] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:13 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) [ 313.960535][ T26] audit: type=1326 audit(1554235213.927:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16456 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:14 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x10006, 0x0, 0x0, 0xffffffff}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000e4ffc8)={0x0, 0x0, 0x0}, 0x0) [ 314.161038][ T26] audit: type=1326 audit(1554235214.127:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16702 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:14 executing program 1: [ 314.233512][ T26] audit: type=1326 audit(1554235214.167:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16570 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:14 executing program 0: 20:00:14 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:14 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) [ 314.359180][ T26] audit: type=1326 audit(1554235214.187:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16571 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:14 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc2d}], 0x1, 0x7fffffffffffffff) 20:00:14 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:14 executing program 0: socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_FPEXC(0xc, 0x0) r2 = dup2(r1, r1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) setsockopt$inet_buf(r2, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000200)=0xc) 20:00:14 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) getsockname(r0, &(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000440)=0x80) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) dup2(r0, r1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x17a, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x2a6) 20:00:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:14 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:00:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(0x0, 0xfffffeca, 0x0) dup3(r1, r0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) [ 314.901177][T16845] FAT-fs (loop4): bogus number of reserved sectors 20:00:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r0, 0x0) [ 314.942708][T16845] FAT-fs (loop4): Can't find a valid FAT filesystem [ 314.961153][ T26] audit: type=1326 audit(1554235214.927:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16702 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b11a code=0xffff0000 20:00:15 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000440)) r0 = timerfd_create(0x1, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000740)=""/4096) timerfd_gettime(r0, &(0x7f0000001740)) 20:00:15 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(0x0, r0, 0x13) 20:00:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x0, 0x0, 0x0, 0x0) io_destroy(0x0) 20:00:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000240)={0x1, 0x0, [0x10000040000021, 0x9]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:15 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x2b2}, 0x7ff}], 0x1, 0x8000000000000, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 20:00:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x20, 0x0) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x60) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) 20:00:15 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(0x0, r0, 0x13) 20:00:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) 20:00:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101006) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x1, 0x400000000000038}], 0xff49) [ 315.847934][T17100] FAT-fs (loop4): bogus number of reserved sectors [ 315.901209][T17100] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:16 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(0x0, r0, 0x13) 20:00:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) 20:00:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:16 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) [ 316.375668][T17117] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. 20:00:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[], 0xeb) 20:00:16 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, 0x0, 0x13) [ 316.420329][T17117] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:16 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x21, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 20:00:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:16 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:16 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:16 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, 0x0, 0x13) 20:00:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 316.749158][T17347] FAT-fs (loop4): bogus number of reserved sectors [ 316.788423][T17347] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:16 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000000c0)={0x1, [0x7f]}) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x400000000000224, 0x0) 20:00:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:17 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:17 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:17 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, 0x0, 0x13) 20:00:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:17 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:17 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 317.665519][T17598] FAT-fs (loop4): bogus number of reserved sectors [ 317.679797][T17598] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:17 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x0) 20:00:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:17 executing program 5: clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:17 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:18 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:18 executing program 5: clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:18 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x0) 20:00:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:18 executing program 5: clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 318.580192][T17772] __ntfs_error: 6 callbacks suppressed [ 318.580231][T17772] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 318.612424][T17772] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:18 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 318.644465][T17835] FAT-fs (loop4): bogus number of reserved sectors 20:00:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 318.686982][T17835] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:18 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x0) 20:00:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:19 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:19 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:19 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) 20:00:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 20:00:19 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0xc004ae0a, &(0x7f0000000140)=""/40) [ 319.467644][T18019] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 319.480608][T18029] FAT-fs (loop4): bogus number of reserved sectors [ 319.489596][T18029] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:19 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 319.576882][T18019] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:19 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:19 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 319.874904][T18050] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 319.926296][T18050] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:20 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = open(0x0, 0x0, 0x0) write$UHID_INPUT(r0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) [ 320.342382][T18137] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 320.357707][T18137] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 320.438762][T18178] FAT-fs (loop4): bogus number of reserved sectors [ 320.485027][T18178] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x101d0) 20:00:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0xc004ae0a, &(0x7f0000000140)=""/40) 20:00:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:20 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, 0x0) 20:00:20 executing program 5: socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 320.691652][T18193] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 320.714154][T18193] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:20 executing program 5: socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) 20:00:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, 0x0) 20:00:21 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:21 executing program 5: socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, &(0x7f00000001c0)=0x1e) [ 321.294043][T18223] FAT-fs (loop4): bogus number of reserved sectors [ 321.326014][T18223] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) 20:00:21 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) r0 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0xffffffffffff0001, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@case_sensitive_no='case_sensitive=no'}, {@show_sys_files_yes='show_sys_files=yes'}, {@disable_sparse_yes='disable_sparse=yes'}], [{@dont_measure='dont_measure'}, {@euid_eq={'euid'}}, {@audit='audit'}]}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140), 0x0) creat(0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) io_setup(0x3ff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, 0x0) lgetxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='security.apparmor\x00', &(0x7f00000004c0)=""/127, 0x7f) 20:00:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f00000001c0)) 20:00:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0xc004ae0a, 0x0) 20:00:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f00000001c0)) 20:00:21 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:00:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f00000001c0)) 20:00:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:22 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 322.189309][T18390] FAT-fs (loop4): bogus number of reserved sectors [ 322.196213][T18390] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, 0x0) 20:00:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 20:00:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, 0x0) 20:00:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:30 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:00:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'HL\x00'}, 0x0) 20:00:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 20:00:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:00:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x00~WMzU\xed\xbb\xc8\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xb1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\x19sT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6d\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\xf7\xff\xff\xff\xff\xff\xff\xff\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xecv:\x1ba=\xd7G\xd5)\xeap\xef\x02\x98\xff\xf5f\x160\xb9\x9ay\xec\x82i\xaf\x9b\xe1x\xae\xca\x17\xfe\xfb\x14\xfd=\x00\x97Z\x99\x9dy\xba\x89M\xba\xe4\xc1\xa6\x06\x00\x00\x00\x00\x00\x00\x00x\"m\a\xe6:?E\x96~\x0e\xe8Y\xbbn\x0f0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xffffffffffffffea) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_int(r2, 0x29, 0x5b, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@remote, 0x4e23, 0xe1, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r4}, {0xffff, 0x4, 0x1, 0x0, 0x8}, {0x6, 0x8}, 0x3f, 0x6e6bbe, 0x1, 0x0, 0x1, 0x3}, {{@in=@loopback, 0x4d3, 0xff}, 0x2, @in6=@ipv4={[], [], @empty}, 0x3505, 0x1, 0x0, 0x0, 0x0, 0x8000}}, 0xe8) [ 330.918248][T18629] __ntfs_error: 16 callbacks suppressed [ 330.918261][T18629] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 330.951509][T18634] FAT-fs (loop4): bogus number of reserved sectors 20:00:30 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001840)) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) timer_gettime(0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) [ 330.984809][T18629] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 331.040269][T18634] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:31 executing program 5: get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3) 20:00:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) [ 331.247785][T18753] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 331.327787][T18753] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:40 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:00:40 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1400008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write(r0, &(0x7f00000001c0)="ee9808a6519c304e00b63871b7737ad226f9a5fe0100000000000000b106bc4df5e45a8bb3c30aec693ba812bbe2761885ae04426ffa114aa4dc15a6507a2b6e8d310e6fb7857cda5849783135e18d12238d15e671624ed3c57c9291b11b45aaba1a98ff2f273912b9da2147f22377ed5f33f67844392cc1b8d6ee290a07bc661bc323ce0e901c3a909311325e0b1b9e7474e30e3790e9b914a19d19200100000000000000ada70c91920708f6c3223e321eae15cc3406a3c0d391a08c904cb59dada36efa2ebbf0aa29b58239e0c17436eef4f1", 0xd4) 20:00:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) 20:00:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x2}, 0x1c) syz_emit_ethernet(0x437, &(0x7f00008bbfba)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x401, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffff0a000000}, @mcast2, {[], @dccp={{0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "24a589", 0x0, '~9\f'}, "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"}}}}}}, 0x0) 20:00:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 340.231419][T18806] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 340.232954][T18783] FAT-fs (loop4): bogus number of reserved sectors [ 340.252884][T18806] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:40 executing program 5: [ 340.275503][T18783] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) 20:00:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 20:00:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) pipe2(&(0x7f0000000300), 0x0) unshare(0x400) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 20:00:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) [ 340.589589][T18994] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 340.600155][T18994] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:48 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:00:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) 20:00:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 20:00:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 348.979434][T19022] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 348.979473][T19029] FAT-fs (loop4): bogus number of reserved sectors [ 349.012255][T19029] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 349.036053][T19022] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:00:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 349.147177][T19144] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 349.183669][T19144] ntfs: (device loop5): parse_options(): Unrecognized mount option . 20:00:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 349.414393][T19160] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 349.442693][T19160] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 349.628713][T19268] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 349.652860][T19268] ntfs: (device loop5): parse_options(): Unrecognized mount option . 20:00:58 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) 20:00:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:00:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(r0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r0) 20:00:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 358.278285][T19280] FAT-fs (loop4): bogus number of reserved sectors [ 358.300965][T19289] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 358.327328][T19290] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 358.348814][T19289] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 358.357772][T19290] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 358.369436][T19280] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(r0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r0) 20:00:58 executing program 5: syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 358.569728][T19403] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 358.596249][T19412] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 358.622191][T19412] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 358.634409][T19403] ntfs: (device loop5): parse_options(): Unrecognized mount option . 20:00:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(r0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r0) 20:00:59 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) 20:00:59 executing program 5: syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:00:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 359.115940][T19537] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 359.128609][T19539] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise_type. [ 359.179993][T19549] FAT-fs (loop4): bogus number of reserved sectors [ 359.206734][T19549] FAT-fs (loop4): Can't find a valid FAT filesystem 20:00:59 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:00:59 executing program 5: syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:00:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:00 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) 20:01:00 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:00 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:00 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 360.220323][T19613] FAT-fs (loop4): bogus number of reserved sectors 20:01:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) [ 360.280101][T19613] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:00 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:00 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, 0xffffffffffffffff, 0x0) 20:01:00 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:00 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, 0xffffffffffffffff, 0x0) 20:01:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:01 executing program 2: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 361.252262][T19678] FAT-fs (loop4): bogus number of reserved sectors 20:01:01 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, 0xffffffffffffffff, 0x0) [ 361.344927][T19678] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:01 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:01 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:01 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:01 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:01 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 362.047938][T19753] FAT-fs (loop4): invalid media value (0x00) 20:01:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 362.143751][T19753] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:02 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 363.019099][T19829] FAT-fs (loop4): invalid media value (0x00) 20:01:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 363.111347][T19829] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:03 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) [ 363.420631][T19852] __ntfs_error: 54 callbacks suppressed [ 363.420667][T19852] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 363.469935][T19852] ntfs: (device loop0): parse_options(): Unrecognized mount option . 20:01:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:03 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:03 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) [ 363.803845][T19875] FAT-fs (loop0): bogus number of reserved sectors [ 363.841558][T19882] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise_type. 20:01:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) [ 363.872848][T19875] FAT-fs (loop0): Can't find a valid FAT filesystem [ 363.873280][T19882] ntfs: (device loop2): parse_options(): Unrecognized mount option . 20:01:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:03 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) [ 363.995647][T19890] FAT-fs (loop4): invalid media value (0x00) 20:01:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 364.103213][T19890] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) [ 364.278628][T19914] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise_type. [ 364.331699][T19914] ntfs: (device loop2): parse_options(): Unrecognized mount option . 20:01:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:04 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1013, r0, 0x0) 20:01:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 364.732246][T19936] FAT-fs (loop0): invalid media value (0x00) [ 364.742026][T19936] FAT-fs (loop0): Can't find a valid FAT filesystem [ 364.769434][T19934] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise_type. [ 364.795081][T19934] ntfs: (device loop2): parse_options(): Unrecognized mount option . 20:01:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 364.953443][T19949] FAT-fs (loop4): invalid media value (0x00) [ 365.045652][T19949] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 365.130966][T19967] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise_type. [ 365.140611][T19967] ntfs: (device loop2): parse_options(): Unrecognized mount option . 20:01:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:05 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1013, r0, 0x0) 20:01:05 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) 20:01:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) [ 365.820506][T20011] FAT-fs (loop4): invalid media value (0x00) [ 365.852282][T20011] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r2, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x27c}]) io_getevents(r2, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r2) 20:01:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:06 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1013, r0, 0x0) 20:01:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:06 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 20:01:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 366.836960][T20072] FAT-fs (loop4): invalid media value (0x00) [ 366.847165][T20072] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) 20:01:07 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x10, r0, 0x0) 20:01:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:07 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 20:01:07 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8800000) 20:01:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[], [{@appraise_type='appraise_type=imasig'}]}) [ 367.758178][T20129] FAT-fs (loop4): invalid media value (0x00) 20:01:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 367.812975][T20129] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:07 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:08 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:08 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:08 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x10, r0, 0x0) [ 368.522003][T20177] __ntfs_error: 14 callbacks suppressed [ 368.522013][T20177] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 368.581878][T20187] FAT-fs (loop4): invalid media value (0x00) [ 368.600937][T20187] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:08 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES32], 0x4) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 369.044138][T20203] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 20:01:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:09 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:09 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:09 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2], 0x82) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, 0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) 20:01:09 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x10, r0, 0x0) [ 369.554719][T20286] FAT-fs (loop4): invalid media value (0x00) 20:01:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, 0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) [ 369.595974][T20286] FAT-fs (loop4): Can't find a valid FAT filesystem 20:01:09 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, 0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) 20:01:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:10 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2], 0x82) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:10 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, 0xffffffffffffffff, 0x0) 20:01:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:10 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:10 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(0x0, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x0, 0x0) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:11 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:11 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2], 0x82) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x0, 0x0) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:11 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, 0xffffffffffffffff, 0x0) 20:01:11 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) write$P9_RSTATu(r0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x0, 0x0) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:11 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:11 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x0, &(0x7f00000000c0)) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:12 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:12 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x0, &(0x7f00000000c0)) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:12 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, 0xffffffffffffffff, 0x0) 20:01:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x0, &(0x7f00000000c0)) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:12 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[0x0]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:12 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:12 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[0x0]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:13 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:13 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 20:01:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[0x0]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 373.347178][ T26] audit: type=1804 audit(1554235273.317:177): pid=21075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir038695207/syzkaller.6SGw2R/413/file0" dev="sda1" ino=17556 res=1 20:01:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:13 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) 20:01:13 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:13 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 20:01:14 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) fsync(0xffffffffffffffff) epoll_create(0x0) pipe2(0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 20:01:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 20:01:14 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 374.516074][ T26] audit: type=1800 audit(1554235274.487:178): pid=21327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16033 res=0 20:01:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:14 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 374.758079][ T26] audit: type=1800 audit(1554235274.727:179): pid=21334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16241 res=0 20:01:14 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) [ 375.003801][ T26] audit: type=1800 audit(1554235274.977:180): pid=21339 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16033 res=0 20:01:15 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:15 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 375.152838][ T26] audit: type=1804 audit(1554235275.117:181): pid=21342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir079225796/syzkaller.sn9vTT/411/file0" dev="sda1" ino=16241 res=1 20:01:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 20:01:15 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 375.321430][ T26] audit: type=1804 audit(1554235275.287:182): pid=21346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir003392966/syzkaller.YDa0zD/431/file0" dev="sda1" ino=16305 res=1 [ 375.406406][ T26] audit: type=1804 audit(1554235275.367:183): pid=21350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir737283740/syzkaller.SCvt9c/399/file0" dev="sda1" ino=16033 res=1 20:01:15 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:15 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) 20:01:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 375.626067][ T26] audit: type=1804 audit(1554235275.587:184): pid=21420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir079225796/syzkaller.sn9vTT/412/file0" dev="sda1" ino=16051 res=1 20:01:15 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) [ 375.710167][ T26] audit: type=1800 audit(1554235275.677:185): pid=21446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16193 res=0 [ 375.837760][ T26] audit: type=1800 audit(1554235275.807:186): pid=21471 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16305 res=0 20:01:15 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:15 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) [ 375.976129][ T26] audit: type=1804 audit(1554235275.937:187): pid=21475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir737283740/syzkaller.SCvt9c/400/file0" dev="sda1" ino=16033 res=1 20:01:16 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) 20:01:16 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r1, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) 20:01:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:16 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:16 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:16 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:16 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:16 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:16 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:16 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c6203965cb8304995f3cce3901e4181819c01527cc9d673875defcbcbd2ef00b254d1b5962ca25553d2ddfbf9688d477b7b61a2b5f9a5508a3209761ed4e42da03f6ba57ae8954448737388272289be50e580fab873211432200d10ff485203edaa59cf69bdda3fea958ee56ccab262a4a5d3f2b038f688b5d37f3b3716f7a56c65115d61d7fe1b59de7af0ba92d3cca2caa5f7287abe6c1eb2ed465d5930521b3565c012273cd16099adb3b3bfa6c8585255280ee34d6f26fe2aba697e929098f4eb81e5dfb43c2893c2ebfbdfb0563cac0d8ea1a707a75b8b880b1ce41662970bea4d340f29dcf81066c04b518839b9b9c60d28b60d666d7e4c000000002eab60f31ded25f4a320b485c8350fa6a63c0c8cf3295aa075b08d1910cbe1e03e875aa4ea15304888859ccaf35f01e852da1584e68c1f5322f9ea6f4dd85936afd90120dcc6e5e98ed1b6d8b4390d2912f7f7144486633b24ca15c774869e9e69e340ac512f28abee2a2181e6ad276217ddfacc220f920004000000000000d3751abb15264003354ed023d14dc38665a566a2ab92aa71d10eb4a80e92446dffca3b02c70726b8a9defc211c8f7005ccd1defde97f7e57c5eaef853b4a4313f7b780eefcbab14b36000b3415d2e626cc848e4a04a844bcb87b"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:17 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:17 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:17 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:17 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(0x0, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x0, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x392) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:18 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:18 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x0, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:18 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:18 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x0, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:18 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x0, 0x0, &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:18 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x0, 0x0, &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:19 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x0, 0x0, &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:19 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:19 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x1, &(0x7f0000000100)=[{}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:19 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x1, &(0x7f0000000100)=[{}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:20 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:20 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x1, &(0x7f0000000100)=[{}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:20 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x1, &(0x7f0000000100)=[{}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:20 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:20 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 20:01:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x1, &(0x7f0000000100)=[{}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:20 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x1, &(0x7f0000000100)=[{}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:20 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x2, &(0x7f0000000100)=[{}, {}], 0x0) io_destroy(r3) 20:01:21 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x2, &(0x7f0000000100)=[{}, {}], 0x0) io_destroy(r3) 20:01:21 executing program 5: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xffffffffffffffdc) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:21 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x2, &(0x7f0000000100)=[{}, {}], 0x0) io_destroy(r3) 20:01:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) 20:01:21 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) 20:01:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, 0x0) 20:01:22 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="8a0000000162001f0000080000d900000000e1ff000000000000000000140600000000feffff050000000000000007006d643573756d5c000026006264657676626f786e65743176626f786e65743023766d6e657430766d6e650000000074683102006c6f13006574683bdae6cd3dbf31637075736574237662", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32], 0x86) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) 20:01:22 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) [ 382.376194][T22903] FAULT_INJECTION: forcing a failure. [ 382.376194][T22903] name failslab, interval 1, probability 0, space 0, times 1 [ 382.451151][T22903] CPU: 0 PID: 22903 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190402 #16 [ 382.460300][T22903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.470361][T22903] Call Trace: [ 382.473794][T22903] dump_stack+0x172/0x1f0 [ 382.478189][T22903] should_fail.cold+0xa/0x15 [ 382.482803][T22903] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 382.488680][T22903] ? ___might_sleep+0x163/0x280 [ 382.493586][T22903] __should_failslab+0x121/0x190 [ 382.498597][T22903] should_failslab+0x9/0x14 [ 382.503152][T22903] kmem_cache_alloc_trace+0x2d1/0x760 [ 382.508635][T22903] snd_pcm_oss_change_params_locked+0x1a7/0x3750 [ 382.515054][T22903] ? __mutex_lock+0x3cd/0x1310 [ 382.519906][T22903] ? aa_file_perm+0x432/0xeb0 [ 382.524605][T22903] ? _snd_pcm_hw_param_set.constprop.0+0x590/0x590 [ 382.531121][T22903] ? mutex_trylock+0x1e0/0x1e0 [ 382.535955][T22903] ? find_held_lock+0x35/0x130 [ 382.540774][T22903] ? __fget+0x35a/0x550 [ 382.544947][T22903] ? lock_downgrade+0x880/0x880 [ 382.549864][T22903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.556131][T22903] snd_pcm_oss_make_ready_locked+0xbc/0x130 [ 382.562043][T22903] snd_pcm_oss_write+0x42b/0x8f0 [ 382.567001][T22903] ? apparmor_file_permission+0x25/0x30 [ 382.572548][T22903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.578859][T22903] __vfs_write+0x8d/0x110 [ 382.583204][T22903] ? snd_pcm_oss_ioctl_compat+0x30/0x30 [ 382.588777][T22903] vfs_write+0x20c/0x580 [ 382.593025][T22903] ksys_write+0xea/0x1f0 [ 382.597286][T22903] ? __ia32_sys_read+0xb0/0xb0 [ 382.602092][T22903] ? do_syscall_64+0x26/0x610 [ 382.606780][T22903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.612858][T22903] ? do_syscall_64+0x26/0x610 [ 382.617561][T22903] __x64_sys_write+0x73/0xb0 [ 382.622219][T22903] do_syscall_64+0x103/0x610 [ 382.626832][T22903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.632732][T22903] RIP: 0033:0x4582b9 [ 382.636633][T22903] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.656235][T22903] RSP: 002b:00007f56fd778c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 382.664655][T22903] RAX: ffffffffffffffda RBX: 00007f56fd778c90 RCX: 00000000004582b9 [ 382.672633][T22903] RDX: 00000000fffffdb4 RSI: 0000000020000200 RDI: 0000000000000003 [ 382.680608][T22903] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 382.688588][T22903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56fd7796d4 20:01:22 executing program 2 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 382.696562][T22903] R13: 00000000004c7a03 R14: 00000000004ddaa8 R15: 0000000000000004 20:01:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 382.745460][T22907] FAULT_INJECTION: forcing a failure. [ 382.745460][T22907] name failslab, interval 1, probability 0, space 0, times 1 20:01:22 executing program 5 (fault-call:1 fault-nth:1): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) [ 382.792760][T22907] CPU: 0 PID: 22907 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190402 #16 [ 382.802033][T22907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.812096][T22907] Call Trace: [ 382.815405][T22907] dump_stack+0x172/0x1f0 [ 382.819753][T22907] should_fail.cold+0xa/0x15 [ 382.824352][T22907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 382.830155][T22907] ? ___might_sleep+0x163/0x280 [ 382.835005][T22907] __should_failslab+0x121/0x190 [ 382.840475][T22907] should_failslab+0x9/0x14 [ 382.844970][T22907] __kmalloc+0x2dc/0x740 [ 382.849284][T22907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.855535][T22907] ? strnlen_user+0x1f0/0x280 [ 382.860205][T22907] ? __x64_sys_memfd_create+0x13c/0x470 [ 382.865746][T22907] __x64_sys_memfd_create+0x13c/0x470 [ 382.871102][T22907] ? memfd_fcntl+0x1ea0/0x1ea0 [ 382.875864][T22907] do_syscall_64+0x103/0x610 [ 382.880462][T22907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.886444][T22907] RIP: 0033:0x4582b9 [ 382.890344][T22907] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.910096][T22907] RSP: 002b:00007ff49cf21a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 382.918498][T22907] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 382.926544][T22907] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 382.934508][T22907] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 20:01:22 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) [ 382.942500][T22907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff49cf226d4 [ 382.950468][T22907] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:23 executing program 2 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 383.046798][T22920] FAULT_INJECTION: forcing a failure. [ 383.046798][T22920] name failslab, interval 1, probability 0, space 0, times 0 [ 383.059374][T22921] FAULT_INJECTION: forcing a failure. [ 383.059374][T22921] name failslab, interval 1, probability 0, space 0, times 0 [ 383.116643][T22920] CPU: 1 PID: 22920 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190402 #16 [ 383.125805][T22920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.135872][T22920] Call Trace: [ 383.139180][T22920] dump_stack+0x172/0x1f0 [ 383.143534][T22920] should_fail.cold+0xa/0x15 [ 383.156656][T22920] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 383.162480][T22920] ? ___might_sleep+0x163/0x280 [ 383.167379][T22920] __should_failslab+0x121/0x190 [ 383.172344][T22920] should_failslab+0x9/0x14 [ 383.176866][T22920] kmem_cache_alloc_trace+0x2d1/0x760 [ 383.182264][T22920] snd_pcm_oss_change_params_locked+0x1df/0x3750 [ 383.188612][T22920] ? __mutex_lock+0x3cd/0x1310 [ 383.193402][T22920] ? _snd_pcm_hw_param_set.constprop.0+0x590/0x590 [ 383.199914][T22920] ? mutex_trylock+0x1e0/0x1e0 [ 383.204687][T22920] ? find_held_lock+0x35/0x130 [ 383.209464][T22920] ? __fget+0x35a/0x550 [ 383.213638][T22920] ? lock_downgrade+0x880/0x880 [ 383.218499][T22920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.224760][T22920] snd_pcm_oss_make_ready_locked+0xbc/0x130 [ 383.230671][T22920] snd_pcm_oss_write+0x42b/0x8f0 [ 383.235647][T22920] ? apparmor_file_permission+0x25/0x30 [ 383.241207][T22920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.247463][T22920] __vfs_write+0x8d/0x110 [ 383.251804][T22920] ? snd_pcm_oss_ioctl_compat+0x30/0x30 [ 383.257369][T22920] vfs_write+0x20c/0x580 [ 383.261626][T22920] ksys_write+0xea/0x1f0 [ 383.265876][T22920] ? __ia32_sys_read+0xb0/0xb0 [ 383.270646][T22920] ? do_syscall_64+0x26/0x610 [ 383.275329][T22920] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.281401][T22920] ? do_syscall_64+0x26/0x610 [ 383.286089][T22920] __x64_sys_write+0x73/0xb0 [ 383.290686][T22920] do_syscall_64+0x103/0x610 [ 383.295297][T22920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.301194][T22920] RIP: 0033:0x4582b9 [ 383.305092][T22920] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.325049][T22920] RSP: 002b:00007f56fd778c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 383.333469][T22920] RAX: ffffffffffffffda RBX: 00007f56fd778c90 RCX: 00000000004582b9 [ 383.341724][T22920] RDX: 00000000fffffdb4 RSI: 0000000020000200 RDI: 0000000000000003 [ 383.349713][T22920] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 383.357692][T22920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56fd7796d4 [ 383.365672][T22920] R13: 00000000004c7a03 R14: 00000000004ddaa8 R15: 0000000000000004 [ 383.376377][T22921] CPU: 0 PID: 22921 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 383.385510][T22921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.395569][T22921] Call Trace: [ 383.398878][T22921] dump_stack+0x172/0x1f0 [ 383.403235][T22921] should_fail.cold+0xa/0x15 [ 383.407853][T22921] ? fault_create_debugfs_attr+0x1e0/0x1e0 20:01:23 executing program 5 (fault-call:1 fault-nth:2): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) [ 383.413672][T22921] ? ___might_sleep+0x163/0x280 [ 383.418544][T22921] __should_failslab+0x121/0x190 [ 383.423486][T22921] should_failslab+0x9/0x14 [ 383.427995][T22921] __kmalloc+0x2dc/0x740 [ 383.432245][T22921] ? audit_add_tree_rule.cold+0x37/0x37 [ 383.437805][T22921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.444063][T22921] ? strnlen_user+0x1f0/0x280 [ 383.448751][T22921] ? __x64_sys_memfd_create+0x13c/0x470 [ 383.454326][T22921] __x64_sys_memfd_create+0x13c/0x470 [ 383.454343][T22921] ? memfd_fcntl+0x1ea0/0x1ea0 [ 383.454357][T22921] ? do_syscall_64+0x26/0x610 [ 383.454372][T22921] ? lockdep_hardirqs_on+0x418/0x5d0 [ 383.454440][T22921] ? trace_hardirqs_on+0x67/0x230 [ 383.454460][T22921] do_syscall_64+0x103/0x610 [ 383.464589][T22921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.464602][T22921] RIP: 0033:0x4582b9 [ 383.464615][T22921] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:01:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 383.464621][T22921] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 383.464633][T22921] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 383.464641][T22921] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 383.464649][T22921] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 383.464657][T22921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccf8d246d4 [ 383.464666][T22921] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 [ 383.605410][T23032] FAULT_INJECTION: forcing a failure. [ 383.605410][T23032] name failslab, interval 1, probability 0, space 0, times 0 [ 383.619886][T23029] __ntfs_error: 10 callbacks suppressed [ 383.619915][T23029] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 383.646238][T23032] CPU: 0 PID: 23032 Comm: syz-executor.5 Not tainted 5.1.0-rc3-next-20190402 #16 [ 383.655400][T23032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.665465][T23032] Call Trace: [ 383.668774][T23032] dump_stack+0x172/0x1f0 [ 383.674112][T23032] should_fail.cold+0xa/0x15 [ 383.678719][T23032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 383.684543][T23032] ? ___might_sleep+0x163/0x280 [ 383.689417][T23032] __should_failslab+0x121/0x190 [ 383.694370][T23032] should_failslab+0x9/0x14 [ 383.698889][T23032] kmem_cache_alloc_trace+0x2d1/0x760 [ 383.704282][T23032] snd_pcm_oss_change_params_locked+0x217/0x3750 [ 383.710627][T23032] ? __mutex_lock+0x3cd/0x1310 [ 383.715411][T23032] ? _snd_pcm_hw_param_set.constprop.0+0x590/0x590 [ 383.721921][T23032] ? mutex_trylock+0x1e0/0x1e0 [ 383.726701][T23032] ? find_held_lock+0x35/0x130 [ 383.731477][T23032] ? __fget+0x35a/0x550 [ 383.735656][T23032] ? lock_downgrade+0x880/0x880 [ 383.740516][T23032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.746784][T23032] snd_pcm_oss_make_ready_locked+0xbc/0x130 [ 383.752789][T23032] snd_pcm_oss_write+0x42b/0x8f0 [ 383.757742][T23032] ? apparmor_file_permission+0x25/0x30 [ 383.763309][T23032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.769564][T23032] __vfs_write+0x8d/0x110 [ 383.773905][T23032] ? snd_pcm_oss_ioctl_compat+0x30/0x30 [ 383.779462][T23032] vfs_write+0x20c/0x580 [ 383.783718][T23032] ksys_write+0xea/0x1f0 [ 383.787970][T23032] ? __ia32_sys_read+0xb0/0xb0 [ 383.792741][T23032] ? do_syscall_64+0x26/0x610 [ 383.797434][T23032] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.803601][T23032] ? do_syscall_64+0x26/0x610 [ 383.808295][T23032] __x64_sys_write+0x73/0xb0 [ 383.812901][T23032] do_syscall_64+0x103/0x610 [ 383.817508][T23032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.823400][T23032] RIP: 0033:0x4582b9 [ 383.827291][T23032] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.846881][T23032] RSP: 002b:00007f56fd778c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 383.855304][T23032] RAX: ffffffffffffffda RBX: 00007f56fd778c90 RCX: 00000000004582b9 [ 383.863268][T23032] RDX: 00000000fffffdb4 RSI: 0000000020000200 RDI: 0000000000000003 [ 383.871235][T23032] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 383.879202][T23032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56fd7796d4 [ 383.887433][T23032] R13: 00000000004c7a03 R14: 00000000004ddaa8 R15: 0000000000000004 20:01:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:25 executing program 1 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x2ae) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:25 executing program 5 (fault-call:1 fault-nth:3): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='\ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(0x0) [ 385.094448][T23050] FAULT_INJECTION: forcing a failure. [ 385.094448][T23050] name failslab, interval 1, probability 0, space 0, times 0 [ 385.112738][T23050] CPU: 0 PID: 23050 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 385.121888][T23050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.131953][T23050] Call Trace: [ 385.135258][T23050] dump_stack+0x172/0x1f0 [ 385.139604][T23050] should_fail.cold+0xa/0x15 [ 385.144675][T23050] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 385.150590][T23050] ? ___might_sleep+0x163/0x280 [ 385.155718][T23050] __should_failslab+0x121/0x190 [ 385.160735][T23050] ? shmem_destroy_callback+0xc0/0xc0 [ 385.166115][T23050] should_failslab+0x9/0x14 [ 385.170630][T23050] kmem_cache_alloc+0x2b2/0x6f0 [ 385.175495][T23050] ? __alloc_fd+0x430/0x530 [ 385.180012][T23050] ? shmem_destroy_callback+0xc0/0xc0 [ 385.185390][T23050] shmem_alloc_inode+0x1c/0x50 [ 385.190165][T23050] alloc_inode+0x66/0x190 [ 385.194505][T23050] new_inode_pseudo+0x19/0xf0 [ 385.199211][T23050] new_inode+0x1f/0x40 [ 385.203284][T23050] shmem_get_inode+0x84/0x780 [ 385.207973][T23050] __shmem_file_setup.part.0+0x7e/0x2b0 [ 385.213525][T23050] shmem_file_setup+0x66/0x90 [ 385.218205][T23050] __x64_sys_memfd_create+0x2a2/0x470 [ 385.223581][T23050] ? memfd_fcntl+0x1ea0/0x1ea0 [ 385.228350][T23050] ? do_syscall_64+0x26/0x610 [ 385.233037][T23050] ? lockdep_hardirqs_on+0x418/0x5d0 [ 385.238373][T23050] ? trace_hardirqs_on+0x67/0x230 [ 385.243412][T23050] do_syscall_64+0x103/0x610 [ 385.248015][T23050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.253911][T23050] RIP: 0033:0x4582b9 [ 385.257809][T23050] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.277511][T23050] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 385.285930][T23050] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 385.293905][T23050] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 385.301905][T23050] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 385.309888][T23050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccf8d246d4 [ 385.317864][T23050] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:25 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='%tfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:25 executing program 1 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='n\nfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 385.756997][T23079] FAULT_INJECTION: forcing a failure. [ 385.756997][T23079] name failslab, interval 1, probability 0, space 0, times 0 [ 385.788070][T23079] CPU: 1 PID: 23079 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 385.797228][T23079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.807816][T23079] Call Trace: [ 385.811129][T23079] dump_stack+0x172/0x1f0 [ 385.815481][T23079] should_fail.cold+0xa/0x15 [ 385.820100][T23079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 385.825929][T23079] ? ___might_sleep+0x163/0x280 [ 385.830809][T23079] __should_failslab+0x121/0x190 [ 385.835856][T23079] should_failslab+0x9/0x14 [ 385.840383][T23079] kmem_cache_alloc+0x2b2/0x6f0 [ 385.845253][T23079] ? current_time+0x6b/0x140 [ 385.849913][T23079] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 385.855736][T23079] ? lockdep_hardirqs_on+0x418/0x5d0 [ 385.861044][T23079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.867416][T23079] ? timespec64_trunc+0xf0/0x180 [ 385.872364][T23079] __d_alloc+0x2e/0x8c0 [ 385.876554][T23079] d_alloc_pseudo+0x1e/0x30 [ 385.881127][T23079] alloc_file_pseudo+0xe2/0x280 [ 385.886000][T23079] ? alloc_file+0x4d0/0x4d0 [ 385.890522][T23079] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 385.896781][T23079] __shmem_file_setup.part.0+0x108/0x2b0 [ 385.896801][T23079] shmem_file_setup+0x66/0x90 [ 385.896825][T23079] __x64_sys_memfd_create+0x2a2/0x470 [ 385.896838][T23079] ? memfd_fcntl+0x1ea0/0x1ea0 [ 385.896850][T23079] ? do_syscall_64+0x26/0x610 [ 385.896862][T23079] ? lockdep_hardirqs_on+0x418/0x5d0 [ 385.896875][T23079] ? trace_hardirqs_on+0x67/0x230 [ 385.907414][T23079] do_syscall_64+0x103/0x610 [ 385.907433][T23079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.907444][T23079] RIP: 0033:0x4582b9 [ 385.907460][T23079] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.907467][T23079] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 385.907480][T23079] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 385.907494][T23079] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 385.991257][T23079] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 385.999222][T23079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccf8d246d4 20:01:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1ca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:26 executing program 1 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) [ 386.007439][T23079] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 [ 386.137252][T23090] FAULT_INJECTION: forcing a failure. [ 386.137252][T23090] name failslab, interval 1, probability 0, space 0, times 0 [ 386.185150][T23090] CPU: 1 PID: 23090 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 386.194390][T23090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.204466][T23090] Call Trace: [ 386.207903][T23090] dump_stack+0x172/0x1f0 [ 386.212505][T23090] should_fail.cold+0xa/0x15 [ 386.212527][T23090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 386.223012][T23090] ? ___might_sleep+0x163/0x280 [ 386.223030][T23090] __should_failslab+0x121/0x190 [ 386.223046][T23090] should_failslab+0x9/0x14 [ 386.223061][T23090] kmem_cache_alloc+0x2b2/0x6f0 [ 386.223080][T23090] __alloc_file+0x27/0x300 [ 386.223092][T23090] alloc_empty_file+0x72/0x170 [ 386.223104][T23090] alloc_file+0x5e/0x4d0 [ 386.223123][T23090] alloc_file_pseudo+0x189/0x280 [ 386.248359][T23090] ? alloc_file+0x4d0/0x4d0 [ 386.248380][T23090] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 386.257441][T23090] __shmem_file_setup.part.0+0x108/0x2b0 [ 386.257459][T23090] shmem_file_setup+0x66/0x90 [ 386.257481][T23090] __x64_sys_memfd_create+0x2a2/0x470 [ 386.257499][T23090] ? memfd_fcntl+0x1ea0/0x1ea0 [ 386.293782][T23090] ? do_syscall_64+0x26/0x610 [ 386.298493][T23090] ? lockdep_hardirqs_on+0x418/0x5d0 [ 386.303801][T23090] ? trace_hardirqs_on+0x67/0x230 [ 386.308852][T23090] do_syscall_64+0x103/0x610 [ 386.313553][T23090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.319511][T23090] RIP: 0033:0x4582b9 [ 386.323420][T23090] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.343297][T23090] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 386.351726][T23090] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 386.359717][T23090] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 386.367708][T23090] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 386.375957][T23090] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccf8d246d4 [ 386.383947][T23090] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x2ae) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='n%fs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:28 executing program 1 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1ca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 388.141608][T23104] FAULT_INJECTION: forcing a failure. [ 388.141608][T23104] name failslab, interval 1, probability 0, space 0, times 0 [ 388.165168][T23104] CPU: 1 PID: 23104 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 388.174815][T23104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.185067][T23104] Call Trace: [ 388.188508][T23104] dump_stack+0x172/0x1f0 [ 388.192997][T23104] should_fail.cold+0xa/0x15 [ 388.197784][T23104] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.203630][T23104] ? ___might_sleep+0x163/0x280 [ 388.208686][T23104] __should_failslab+0x121/0x190 [ 388.213946][T23104] should_failslab+0x9/0x14 [ 388.213962][T23104] kmem_cache_alloc+0x2b2/0x6f0 [ 388.213984][T23104] __alloc_file+0x27/0x300 [ 388.213998][T23104] alloc_empty_file+0x72/0x170 [ 388.214012][T23104] alloc_file+0x5e/0x4d0 [ 388.214029][T23104] alloc_file_pseudo+0x189/0x280 [ 388.214041][T23104] ? alloc_file+0x4d0/0x4d0 [ 388.214055][T23104] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 388.214076][T23104] __shmem_file_setup.part.0+0x108/0x2b0 [ 388.214092][T23104] shmem_file_setup+0x66/0x90 [ 388.214111][T23104] __x64_sys_memfd_create+0x2a2/0x470 [ 388.223503][T23104] ? memfd_fcntl+0x1ea0/0x1ea0 [ 388.223518][T23104] ? do_syscall_64+0x26/0x610 [ 388.223533][T23104] ? lockdep_hardirqs_on+0x418/0x5d0 [ 388.223548][T23104] ? trace_hardirqs_on+0x67/0x230 [ 388.223566][T23104] do_syscall_64+0x103/0x610 [ 388.223584][T23104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.223594][T23104] RIP: 0033:0x4582b9 [ 388.223607][T23104] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.223614][T23104] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 20:01:28 executing program 1 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) [ 388.223626][T23104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 388.223633][T23104] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 388.223640][T23104] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 388.223647][T23104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccf8d246d4 [ 388.223653][T23104] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 [ 388.524391][T23125] FAULT_INJECTION: forcing a failure. [ 388.524391][T23125] name failslab, interval 1, probability 0, space 0, times 0 [ 388.586673][T23125] CPU: 0 PID: 23125 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 388.596641][T23125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.606717][T23125] Call Trace: [ 388.610034][T23125] dump_stack+0x172/0x1f0 [ 388.614482][T23125] should_fail.cold+0xa/0x15 [ 388.619204][T23125] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.625491][T23125] ? ___might_sleep+0x163/0x280 [ 388.630367][T23125] __should_failslab+0x121/0x190 [ 388.635352][T23125] should_failslab+0x9/0x14 [ 388.639901][T23125] kmem_cache_alloc+0x2b2/0x6f0 [ 388.645022][T23125] ? notify_change+0x6d5/0xfb0 [ 388.649891][T23125] ? do_sys_ftruncate+0x41e/0x550 [ 388.654940][T23125] getname_flags+0xd6/0x5b0 [ 388.659466][T23125] getname+0x1a/0x20 [ 388.663376][T23125] do_sys_open+0x2c9/0x5d0 [ 388.667843][T23125] ? filp_open+0x80/0x80 [ 388.672209][T23125] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 388.678728][T23125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.684207][T23125] ? do_syscall_64+0x26/0x610 [ 388.688900][T23125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.694981][T23125] ? do_syscall_64+0x26/0x610 [ 388.699679][T23125] __x64_sys_open+0x7e/0xc0 [ 388.704201][T23125] do_syscall_64+0x103/0x610 [ 388.708814][T23125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.714716][T23125] RIP: 0033:0x412251 [ 388.718635][T23125] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 388.738251][T23125] RSP: 002b:00007fccf8d23a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 388.746790][T23125] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 388.755560][T23125] RDX: 00007fccf8d23b0a RSI: 0000000000000002 RDI: 00007fccf8d23b00 [ 388.763546][T23125] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 388.771532][T23125] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 388.779627][T23125] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:34 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0x11fffffb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='n\xa0fs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:34 executing program 1 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1ca) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:34 executing program 3 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) [ 394.837630][T23146] FAULT_INJECTION: forcing a failure. [ 394.837630][T23146] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 394.851727][T23146] CPU: 0 PID: 23146 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 394.861024][T23146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.871273][T23146] Call Trace: [ 394.874603][T23146] dump_stack+0x172/0x1f0 [ 394.879064][T23146] should_fail.cold+0xa/0x15 [ 394.883708][T23146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.889574][T23146] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 394.895237][T23146] ? lockdep_hardirqs_on+0x418/0x5d0 [ 394.900765][T23146] ? retint_kernel+0x2d/0x2d [ 394.905640][T23146] should_fail_alloc_page+0x50/0x60 [ 394.911211][T23146] __alloc_pages_nodemask+0x1a1/0x7e0 [ 394.916705][T23146] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 394.922624][T23146] ? find_held_lock+0x35/0x130 [ 394.927702][T23146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 394.934053][T23146] cache_grow_begin+0x9c/0x860 [ 394.938973][T23146] ? getname_flags+0xd6/0x5b0 [ 394.943791][T23146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 394.950145][T23146] kmem_cache_alloc+0x62d/0x6f0 [ 394.955022][T23146] ? do_sys_ftruncate+0x41e/0x550 [ 394.960248][T23146] getname_flags+0xd6/0x5b0 [ 394.964966][T23146] getname+0x1a/0x20 [ 394.968885][T23146] do_sys_open+0x2c9/0x5d0 [ 394.973474][T23146] ? filp_open+0x80/0x80 [ 394.977824][T23146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.984177][T23146] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 394.989659][T23146] ? do_syscall_64+0x26/0x610 [ 394.994387][T23146] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.000475][T23146] ? do_syscall_64+0x26/0x610 [ 395.005542][T23146] __x64_sys_open+0x7e/0xc0 [ 395.010068][T23146] do_syscall_64+0x103/0x610 [ 395.014681][T23146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.020681][T23146] RIP: 0033:0x412251 [ 395.024591][T23146] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 395.044414][T23146] RSP: 002b:00007fccf8d23a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 395.052958][T23146] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 395.061309][T23146] RDX: 00007fccf8d23b0a RSI: 0000000000000002 RDI: 00007fccf8d23b00 [ 395.069513][T23146] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 395.077590][T23146] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 395.085577][T23146] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:35 executing program 5: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2b7, 0x20000) fcntl$setflags(r0, 0x2, 0x1) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={{r1, r2/1000+10000}, {0x77359400}}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000280)={0x400, 0xed, r3, 0x0, r4, 0x0, 0x1, 0x3}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x5, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) write$binfmt_elf32(r5, &(0x7f00000002c0)=ANY=[], 0x0) mmap$binder(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000000, 0x1013, r5, 0x1) 20:01:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='nt\ns\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) [ 395.234913][T23146] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 20:01:35 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:01:35 executing program 1 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) [ 395.485053][T23175] FAULT_INJECTION: forcing a failure. [ 395.485053][T23175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.498317][T23175] CPU: 1 PID: 23175 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 395.507548][T23175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.517805][T23175] Call Trace: [ 395.521155][T23175] dump_stack+0x172/0x1f0 [ 395.525838][T23175] should_fail.cold+0xa/0x15 [ 395.530836][T23175] ? __lock_acquire+0x548/0x3fb0 [ 395.536031][T23175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 395.542018][T23175] ? __lock_acquire+0x548/0x3fb0 [ 395.547043][T23175] should_fail_alloc_page+0x50/0x60 [ 395.552261][T23175] __alloc_pages_nodemask+0x1a1/0x7e0 [ 395.557665][T23175] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 395.563513][T23175] ? find_held_lock+0x35/0x130 [ 395.568485][T23175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 395.574492][T23175] cache_grow_begin+0x9c/0x860 [ 395.579451][T23175] ? getname_flags+0xd6/0x5b0 [ 395.584163][T23175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.590437][T23175] kmem_cache_alloc+0x62d/0x6f0 [ 395.595396][T23175] ? notify_change+0x6d5/0xfb0 [ 395.600180][T23175] ? do_sys_ftruncate+0x41e/0x550 [ 395.605314][T23175] getname_flags+0xd6/0x5b0 [ 395.609878][T23175] getname+0x1a/0x20 [ 395.613795][T23175] do_sys_open+0x2c9/0x5d0 [ 395.618247][T23175] ? filp_open+0x80/0x80 [ 395.622507][T23175] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.628885][T23175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 395.634536][T23175] ? do_syscall_64+0x26/0x610 [ 395.639229][T23175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.645431][T23175] ? do_syscall_64+0x26/0x610 [ 395.650319][T23175] __x64_sys_open+0x7e/0xc0 [ 395.654892][T23175] do_syscall_64+0x103/0x610 [ 395.659627][T23175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.665739][T23175] RIP: 0033:0x412251 [ 395.669766][T23175] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 395.689643][T23175] RSP: 002b:00007fccf8d23a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 395.698075][T23175] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 395.706067][T23175] RDX: 00007fccf8d23b0a RSI: 0000000000000002 RDI: 00007fccf8d23b00 [ 395.714057][T23175] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 395.722046][T23175] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 20:01:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) [ 395.730076][T23175] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x888, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='nt%s\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 395.902102][T23175] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 20:01:36 executing program 1 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf\n\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x4, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:36 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) [ 396.331571][T23210] FAULT_INJECTION: forcing a failure. [ 396.331571][T23210] name failslab, interval 1, probability 0, space 0, times 0 [ 396.350409][T23210] CPU: 1 PID: 23210 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 396.359550][T23210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.369691][T23210] Call Trace: [ 396.372979][T23210] dump_stack+0x172/0x1f0 [ 396.377308][T23210] should_fail.cold+0xa/0x15 [ 396.381886][T23210] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 396.387771][T23210] ? ___might_sleep+0x163/0x280 [ 396.392631][T23210] __should_failslab+0x121/0x190 [ 396.397558][T23210] should_failslab+0x9/0x14 [ 396.402135][T23210] kmem_cache_alloc+0x2b2/0x6f0 [ 396.407119][T23210] ? rcu_read_lock_sched_held+0x110/0x130 [ 396.412823][T23210] ? kmem_cache_alloc+0x32e/0x6f0 [ 396.417881][T23210] security_file_alloc+0x39/0x170 [ 396.422891][T23210] __alloc_file+0xac/0x300 [ 396.427291][T23210] alloc_empty_file+0x72/0x170 [ 396.432039][T23210] path_openat+0xef/0x46e0 [ 396.436443][T23210] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 396.442241][T23210] ? kasan_slab_alloc+0xf/0x20 [ 396.446996][T23210] ? kmem_cache_alloc+0x11a/0x6f0 [ 396.452003][T23210] ? getname_flags+0xd6/0x5b0 [ 396.456675][T23210] ? getname+0x1a/0x20 [ 396.460739][T23210] ? do_sys_open+0x2c9/0x5d0 [ 396.465312][T23210] ? __x64_sys_open+0x7e/0xc0 [ 396.469988][T23210] ? do_syscall_64+0x103/0x610 [ 396.474748][T23210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.480814][T23210] ? __lock_acquire+0x548/0x3fb0 [ 396.485740][T23210] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 396.491124][T23210] ? __alloc_fd+0x430/0x530 [ 396.496056][T23210] do_filp_open+0x1a1/0x280 [ 396.500552][T23210] ? may_open_dev+0x100/0x100 [ 396.505221][T23210] ? lock_downgrade+0x880/0x880 [ 396.510057][T23210] ? kasan_check_read+0x11/0x20 [ 396.514888][T23210] ? do_raw_spin_unlock+0x57/0x270 [ 396.519981][T23210] ? _raw_spin_unlock+0x2d/0x50 [ 396.524835][T23210] ? __alloc_fd+0x430/0x530 [ 396.529343][T23210] do_sys_open+0x3fe/0x5d0 [ 396.533744][T23210] ? filp_open+0x80/0x80 [ 396.537979][T23210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.544215][T23210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.549661][T23210] ? do_syscall_64+0x26/0x610 [ 396.554326][T23210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.560389][T23210] ? do_syscall_64+0x26/0x610 [ 396.565052][T23210] __x64_sys_open+0x7e/0xc0 [ 396.569551][T23210] do_syscall_64+0x103/0x610 [ 396.574128][T23210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.579998][T23210] RIP: 0033:0x412251 [ 396.583881][T23210] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 396.603467][T23210] RSP: 002b:00007fccf8d02a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 396.611861][T23210] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 396.619837][T23210] RDX: 00007fccf8d02b0a RSI: 0000000000000002 RDI: 00007fccf8d02b00 [ 396.627792][T23210] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 396.635850][T23210] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 396.643988][T23210] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000003 20:01:36 executing program 1 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf#\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 396.830484][T23230] FAULT_INJECTION: forcing a failure. [ 396.830484][T23230] name failslab, interval 1, probability 0, space 0, times 0 [ 396.845057][T23230] CPU: 0 PID: 23230 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 396.854182][T23230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.864242][T23230] Call Trace: [ 396.867541][T23230] dump_stack+0x172/0x1f0 [ 396.871882][T23230] should_fail.cold+0xa/0x15 [ 396.876480][T23230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 396.882297][T23230] ? ___might_sleep+0x163/0x280 [ 396.887160][T23230] __should_failslab+0x121/0x190 [ 396.892162][T23230] ? loop_info64_to_compat+0x6d0/0x6d0 [ 396.897624][T23230] should_failslab+0x9/0x14 [ 396.902130][T23230] kmem_cache_alloc_trace+0x2d1/0x760 [ 396.907507][T23230] ? lockdep_init_map+0x1be/0x6d0 [ 396.912538][T23230] ? loop_info64_to_compat+0x6d0/0x6d0 [ 396.918073][T23230] __kthread_create_on_node+0xf2/0x460 [ 396.923545][T23230] ? lo_ioctl+0x49d/0x23a0 [ 396.927980][T23230] ? kthread_parkme+0xb0/0xb0 [ 396.932671][T23230] ? lo_ioctl+0x49d/0x23a0 [ 396.937103][T23230] ? kasan_check_read+0x11/0x20 [ 396.942051][T23230] ? loop_info64_to_compat+0x6d0/0x6d0 [ 396.947512][T23230] kthread_create_on_node+0xbb/0xf0 [ 396.952711][T23230] ? __kthread_create_on_node+0x460/0x460 [ 396.958445][T23230] ? lockdep_init_map+0x1be/0x6d0 [ 396.964006][T23230] ? lockdep_init_map+0x1be/0x6d0 [ 396.970176][T23230] lo_ioctl+0xc1b/0x23a0 [ 396.974432][T23230] ? lo_rw_aio+0x1130/0x1130 [ 396.979114][T23230] blkdev_ioctl+0x6f2/0x1d10 [ 396.983717][T23230] ? blkpg_ioctl+0xa90/0xa90 [ 396.988317][T23230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 396.993783][T23230] ? retint_kernel+0x2d/0x2d [ 396.998463][T23230] block_ioctl+0xee/0x130 [ 397.002800][T23230] ? blkdev_fallocate+0x410/0x410 [ 397.007829][T23230] do_vfs_ioctl+0xd6e/0x1390 [ 397.012427][T23230] ? ioctl_preallocate+0x210/0x210 [ 397.017540][T23230] ? __fget+0x381/0x550 [ 397.021705][T23230] ? ksys_dup3+0x3e0/0x3e0 [ 397.026142][T23230] ? do_sys_open+0x31d/0x5d0 [ 397.030781][T23230] ? tomoyo_file_ioctl+0x23/0x30 [ 397.035713][T23230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.041955][T23230] ? security_file_ioctl+0x93/0xc0 [ 397.047061][T23230] ksys_ioctl+0xab/0xd0 [ 397.051222][T23230] __x64_sys_ioctl+0x73/0xb0 [ 397.055800][T23230] do_syscall_64+0x103/0x610 [ 397.060389][T23230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.066270][T23230] RIP: 0033:0x458127 [ 397.070158][T23230] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.089752][T23230] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.098149][T23230] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 397.106116][T23230] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 397.114331][T23230] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 397.122295][T23230] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 397.130272][T23230] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:44 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/156) 20:01:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf%\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000040)=0x8) 20:01:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:44 executing program 1 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) [ 404.516936][T23353] FAULT_INJECTION: forcing a failure. [ 404.516936][T23353] name failslab, interval 1, probability 0, space 0, times 0 [ 404.538085][T23353] CPU: 1 PID: 23353 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 404.547260][T23353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.557839][T23353] Call Trace: [ 404.561151][T23353] dump_stack+0x172/0x1f0 [ 404.565497][T23353] should_fail.cold+0xa/0x15 [ 404.570098][T23353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 404.575929][T23353] ? ___might_sleep+0x163/0x280 [ 404.580792][T23353] __should_failslab+0x121/0x190 [ 404.585767][T23353] should_failslab+0x9/0x14 [ 404.590281][T23353] kmem_cache_alloc+0x2b2/0x6f0 [ 404.595153][T23353] ? __schedule+0x1387/0x1cc0 [ 404.599932][T23353] __kernfs_new_node+0xf0/0x6d0 [ 404.604795][T23353] ? _raw_spin_unlock_irq+0x28/0x90 [ 404.610006][T23353] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 404.615477][T23353] ? kasan_check_read+0x11/0x20 [ 404.620341][T23353] ? _raw_spin_unlock_irq+0x5e/0x90 [ 404.625553][T23353] ? __schedule+0x1387/0x1cc0 [ 404.630245][T23353] ? __lock_acquire+0x548/0x3fb0 [ 404.635205][T23353] kernfs_new_node+0x96/0x120 [ 404.639899][T23353] kernfs_create_dir_ns+0x52/0x160 [ 404.645030][T23353] internal_create_group+0x7f8/0xc40 [ 404.650331][T23353] ? bd_set_size+0x89/0xb0 [ 404.654791][T23353] ? remove_files.isra.0+0x190/0x190 [ 404.660101][T23353] sysfs_create_group+0x20/0x30 [ 404.664973][T23353] lo_ioctl+0x124a/0x23a0 [ 404.669316][T23353] ? lo_rw_aio+0x1130/0x1130 [ 404.673918][T23353] blkdev_ioctl+0x6f2/0x1d10 [ 404.678524][T23353] ? blkpg_ioctl+0xa90/0xa90 [ 404.683133][T23353] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 404.688964][T23353] ? __fget+0x35a/0x550 [ 404.693144][T23353] block_ioctl+0xee/0x130 [ 404.697483][T23353] ? blkdev_fallocate+0x410/0x410 [ 404.702513][T23353] do_vfs_ioctl+0xd6e/0x1390 [ 404.707114][T23353] ? ioctl_preallocate+0x210/0x210 [ 404.712241][T23353] ? __fget+0x381/0x550 [ 404.716408][T23353] ? ksys_dup3+0x3e0/0x3e0 [ 404.720834][T23353] ? do_sys_open+0x31d/0x5d0 [ 404.725432][T23353] ? tomoyo_file_ioctl+0x23/0x30 [ 404.730373][T23353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.736622][T23353] ? security_file_ioctl+0x93/0xc0 [ 404.741747][T23353] ksys_ioctl+0xab/0xd0 [ 404.745915][T23353] __x64_sys_ioctl+0x73/0xb0 [ 404.750514][T23353] do_syscall_64+0x103/0x610 [ 404.755141][T23353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.761056][T23353] RIP: 0033:0x458127 [ 404.764981][T23353] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.784594][T23353] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.793022][T23353] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 404.801001][T23353] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 404.808986][T23353] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 20:01:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) [ 404.816969][T23353] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 404.824948][T23353] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 [ 404.850834][T23353] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 20:01:44 executing program 1 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:44 executing program 3: socketpair$unix(0x1, 0x800001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf*\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 405.068540][T23377] FAULT_INJECTION: forcing a failure. [ 405.068540][T23377] name failslab, interval 1, probability 0, space 0, times 0 [ 405.106566][T23377] CPU: 0 PID: 23377 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 405.115717][T23377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.125780][T23377] Call Trace: [ 405.129349][T23377] dump_stack+0x172/0x1f0 [ 405.133691][T23377] should_fail.cold+0xa/0x15 [ 405.138296][T23377] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 405.144121][T23377] ? ___might_sleep+0x163/0x280 [ 405.148990][T23377] __should_failslab+0x121/0x190 [ 405.153944][T23377] should_failslab+0x9/0x14 [ 405.158474][T23377] kmem_cache_alloc+0x2b2/0x6f0 [ 405.163334][T23377] ? __schedule+0x1387/0x1cc0 [ 405.168025][T23377] __kernfs_new_node+0xf0/0x6d0 [ 405.172881][T23377] ? _raw_spin_unlock_irq+0x28/0x90 [ 405.178097][T23377] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 405.183559][T23377] ? kasan_check_read+0x11/0x20 [ 405.188418][T23377] ? _raw_spin_unlock_irq+0x5e/0x90 [ 405.193632][T23377] ? __schedule+0x1387/0x1cc0 [ 405.198345][T23377] ? __lock_acquire+0x548/0x3fb0 [ 405.203295][T23377] kernfs_new_node+0x96/0x120 [ 405.207981][T23377] kernfs_create_dir_ns+0x52/0x160 [ 405.213107][T23377] internal_create_group+0x7f8/0xc40 [ 405.218396][T23377] ? bd_set_size+0x89/0xb0 [ 405.222826][T23377] ? remove_files.isra.0+0x190/0x190 [ 405.228136][T23377] sysfs_create_group+0x20/0x30 [ 405.232998][T23377] lo_ioctl+0x124a/0x23a0 [ 405.237342][T23377] ? lo_rw_aio+0x1130/0x1130 [ 405.241937][T23377] blkdev_ioctl+0x6f2/0x1d10 [ 405.246543][T23377] ? blkpg_ioctl+0xa90/0xa90 [ 405.251143][T23377] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 405.256980][T23377] ? __fget+0x35a/0x550 [ 405.261144][T23377] block_ioctl+0xee/0x130 [ 405.265471][T23377] ? blkdev_fallocate+0x410/0x410 [ 405.270531][T23377] do_vfs_ioctl+0xd6e/0x1390 [ 405.275129][T23377] ? ioctl_preallocate+0x210/0x210 [ 405.280241][T23377] ? __fget+0x381/0x550 [ 405.284409][T23377] ? ksys_dup3+0x3e0/0x3e0 [ 405.288833][T23377] ? do_sys_open+0x31d/0x5d0 [ 405.293427][T23377] ? tomoyo_file_ioctl+0x23/0x30 [ 405.298367][T23377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.304612][T23377] ? security_file_ioctl+0x93/0xc0 [ 405.309747][T23377] ksys_ioctl+0xab/0xd0 [ 405.313909][T23377] __x64_sys_ioctl+0x73/0xb0 [ 405.318506][T23377] do_syscall_64+0x103/0x610 [ 405.323201][T23377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.329098][T23377] RIP: 0033:0x458127 [ 405.332994][T23377] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.352598][T23377] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.361015][T23377] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 20:01:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07"], 0xe6) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 405.369014][T23377] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 405.376993][T23377] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 405.384970][T23377] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 405.392944][T23377] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 [ 405.475150][T23377] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 20:01:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0xeb, r3, 0x0}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) dup3(r3, r1, 0x80000) 20:01:53 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) r1 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)="f1d9733ef098cfa74fdfba921bcaf46a0b950af312ea849e575f3f2f88d5018a78d1e6cc5914c901b99d3a5472d431424905958917a27a7dace1129ef2006a57af36b5a1920f9be93fa40e517e9d133886d69eea519fa64117b13f191cb13e70bc846de982f87b8f6cc9c1d4a18e26c501bc750ca1b6cc4c401c9e79c19436f2096af349d8fe838608549361ed08da48c08c148ab8e7504d52732a2193c63c1fe2c8cd815716d9d49095f11c538036ef0a91f6b57f401a47d4d117d0d5bf1d06b90492d0c0a80f3374ce9a96b16a528d782ea9824aa0bd0288d0", 0xda, 0xfffffffffffffff9) r2 = request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='/dev/dsp\x00', 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="c3d7738f515d6dcc", 0x8, 0xfffffffffffffff9) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000500)=0x100100, 0x4) connect$pppoe(r0, &(0x7f0000000540)={0x18, 0x0, {0x2, @remote, 'lapb0\x00'}}, 0x1e) keyctl$dh_compute(0x17, &(0x7f0000000340)={r1, r2, r3}, &(0x7f0000000380)=""/201, 0xc9, &(0x7f00000004c0)={&(0x7f0000000480)={'streebog512-generic\x00'}}) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) fcntl$getflags(r0, 0x40b) 20:01:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf+\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:53 executing program 1 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:01:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 413.694333][T23419] FAULT_INJECTION: forcing a failure. [ 413.694333][T23419] name failslab, interval 1, probability 0, space 0, times 0 [ 413.726977][T23419] CPU: 1 PID: 23419 Comm: syz-executor.1 Not tainted 5.1.0-rc3-next-20190402 #16 [ 413.736131][T23419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.746200][T23419] Call Trace: [ 413.749509][T23419] dump_stack+0x172/0x1f0 [ 413.753946][T23419] should_fail.cold+0xa/0x15 [ 413.758553][T23419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.764381][T23419] ? ___might_sleep+0x163/0x280 [ 413.769256][T23419] __should_failslab+0x121/0x190 [ 413.774202][T23419] should_failslab+0x9/0x14 [ 413.778710][T23419] kmem_cache_alloc+0x2b2/0x6f0 [ 413.783569][T23419] ? lock_downgrade+0x880/0x880 [ 413.788440][T23419] ? trace_hardirqs_on_caller+0x6a/0x220 [ 413.794088][T23419] __kernfs_new_node+0xf0/0x6d0 [ 413.798950][T23419] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 413.804426][T23419] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.809984][T23419] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.815463][T23419] ? retint_kernel+0x2d/0x2d [ 413.820421][T23419] ? trace_hardirqs_on_caller+0x6a/0x220 [ 413.826072][T23419] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.831903][T23419] kernfs_new_node+0x96/0x120 [ 413.836598][T23419] __kernfs_create_file+0x51/0x340 [ 413.841727][T23419] sysfs_add_file_mode_ns+0x222/0x560 [ 413.847203][T23419] internal_create_group+0x35b/0xc40 [ 413.852495][T23419] ? bd_set_size+0x89/0xb0 [ 413.856931][T23419] ? remove_files.isra.0+0x190/0x190 [ 413.862234][T23419] sysfs_create_group+0x20/0x30 [ 413.867090][T23419] lo_ioctl+0x124a/0x23a0 [ 413.871452][T23419] ? lo_rw_aio+0x1130/0x1130 [ 413.876225][T23419] blkdev_ioctl+0x6f2/0x1d10 [ 413.880827][T23419] ? blkpg_ioctl+0xa90/0xa90 [ 413.885434][T23419] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 413.891337][T23419] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.896814][T23419] ? __fget+0x35a/0x550 [ 413.900981][T23419] block_ioctl+0xee/0x130 [ 413.905329][T23419] ? blkdev_fallocate+0x410/0x410 [ 413.910363][T23419] do_vfs_ioctl+0xd6e/0x1390 [ 413.914982][T23419] ? ioctl_preallocate+0x210/0x210 [ 413.920102][T23419] ? __fget+0x381/0x550 [ 413.924276][T23419] ? ksys_dup3+0x3e0/0x3e0 [ 413.934083][T23419] ? tomoyo_file_ioctl+0x23/0x30 [ 413.939561][T23419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.958681][T23419] ? security_file_ioctl+0x93/0xc0 [ 413.963817][T23419] ksys_ioctl+0xab/0xd0 [ 413.967987][T23419] __x64_sys_ioctl+0x73/0xb0 [ 413.972583][T23419] do_syscall_64+0x103/0x610 [ 413.977440][T23419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.983330][T23419] RIP: 0033:0x458127 [ 413.987228][T23419] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.006835][T23419] RSP: 002b:00007fccf8d23a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 414.015254][T23419] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 414.023232][T23419] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 414.031227][T23419] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 414.039373][T23419] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 414.047367][T23419] R13: 00000000004c6c19 R14: 00000000004dc5f0 R15: 0000000000000004 20:01:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:54 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000080)={0x0, {0x10000, 0x3}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) 20:01:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf-\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 414.396410][T23419] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 20:01:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@gettaction={0x28, 0x30, 0x801, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8}}]}]}, 0x28}}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r2, 0x0) 20:01:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="00810001", @ANYRES16=r3, @ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x8800}, 0x40800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) io_setup(0xff, &(0x7f0000000140)=0x0) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000001c0)=r5) [ 414.617978][T23461] __nla_parse: 34 callbacks suppressed [ 414.617987][T23461] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 414.693548][T23467] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 20:01:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf.\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:01:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='\ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:01:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf0\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:01:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='%tfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:01:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) io_destroy(r3) 20:01:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfX\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 415.383482][T23475] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 20:01:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:01:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='n\nfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:03 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000200), 0xfff, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f00000001c0)={r1, 0x1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x33, 0x403fc) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000000c0)=""/172) 20:02:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:02:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfc\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x35) 20:02:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='n%fs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='n\x98fs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000040)=""/107, &(0x7f00000001c0)=0x6b) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:02:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfd\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='nt\ns\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) io_setup(0x7fffffff, &(0x7f0000000200)) socket$xdp(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) getsockname$unix(r1, &(0x7f0000000040), &(0x7f00000001c0)=0x6e) io_destroy(r4) 20:02:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfi\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:12 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) sendmsg$alg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)=[@iv={0x1018, 0x117, 0x2, 0x1000, "f52e7a589da5fbb32f53fc74425e4ca1e722207953dcef53ed02069e3edc9aad1c1874bd63b2daf8cff90e86f4b3a62124a957e2a188c13c992cf7788e9d0aeed6b2770e1b11502c0375b58acdd21d51ea99c553e0ee3fcae9e5c4c128dd70e5687a2036544d67502701f262d0c9a108b9edba83cbc716c805d125d5905a4e18d2d9338d8104f456076c73f01a79d10490bb0cbf410c6a0bc61eba4ff083577a330e86d7640b842df37734ff7f028f7628c5745e95a7b9272b4f3ffb812b9a1a433d9bb347b37cc90270fa90d917417933b534e81bafd229b8f6524a899de3541a5f209ef1ddc237144b695a47f29f39573777ec89034323a955515c91c223ff56e6f63d8452af9729498b6cf0949d3605ce831c9153ecf1f7b7dd256d6f87db1ecb9d0aad7324486787cfa70221340ccb5bdaba8675c8efddf53466c9aedc2df6553b02ba26929a0283708a63c78b0229604e06810967eecb8fbd2eb45654cbbf393ff30485a0c941db556693bb7ac46661977ea2510142a2d17c07c006cb918e657cd22e346244838c2c49be946e8ccf3541b56cb47ccd2a3755fdb11c77362b8fdcb66ecc9bd393ec378813f736c5a15fd045cda1256a60692d079bfe85e38360f70d73206f526fc6f6aeebf1da6ccfeb5808ea5f4228f804067555cf21dd6d7b663384616670312fd2888bfdb173c6d21aafe7f2a162b57453472f556cf5cf132d35d77820934f5ad32726d2f817266fe41968f6de0eb66c346f407f802e190b150a57b894023e088be25a8d8033f11de05e9ca88a72a663796be98ae46bfe91eac015550e15ba4ddb57a5b1c32f6c7527db783d88287c94577cf9505b8131a4b8ebab7cbd9641c703ff8d01f83cede0b293cff4d88ecb477993422e6996dcda1efa317d49d03bb15770bb6727f03ae6481d5bef71fc717b04bae7c982453f46435dc7bde08042dfc222cfcf6d62d0f0e2bca4ae9784b958ad606684dd9e40c296249335f14d6c53cbfed13d073ed03ee3c3d589e87523959c87083909ac450378da0ddfb549956bf421ee27d4b2997a3aa740ee6d2c8feb7ec20ce277e4814daa7ebb6b1f95daea73d34abecc95bb4371c2dc90a04ce28f565452c1ed3b55c2222bcde5c0e17eb0fd0e8681f8b3e34df430ba2ae24df99153157f3ee29b9311bbd13b5fdf9fbd0fbec05e89c43ba2767d73c45978b76a0caa6d1ac8b0191662b3ac2d28d4b171070047119786614fb5c0493e976eb44e1eed716f14dc17088aea5f07f43d40169aef7cb5763b35f2b795a570f96d27c56f17211f98951e4575e90344ed8a747fe205688273cbaca58d4cc4672eabab0fff0e7779249a2c9c10e3e6424477d95f0ebe411ce14843ffd74039769477941ee85b8c049cce96a44d1011f838ce6b0250df5a1c76c6d8e287b8e48f8aacdf81ea68a63d665eff417631a874dcc20019c67492ba43a819445292781fe0d680ff08f10fd2d0a14ff5b351e4e24ce31013d93d41452c2dbc26aecb0d8b0f0db8e5852553dea85f662f4a817892219b137ccb1ade1330b1a86dadc1a2c3ddc294131157ed15cb7e934ecfab54ece4ecc8123d33d04012dfd788fa7c1ca20c378a1ea67740c791c59f6c64bf1802d39aadbdda0148fef047ce34e8e887089166e3a38f06d80699e239c6dd77abfa7e0e2775a1c7bcd2e2c801946d516240cd150608d75fffb8ddf4fd505d79f74124c5ec7313ff9b787161880c4fa3b3db1bd24220d9a200708578241e1ed272b6c065b345765916f42c8c087cec6a6b0169353fe6060bc7239fbb051e25e580a16f0aefbf440c3875aac92ef02433d5570c617b59c726da1697e1e8dbda7726ad112e42d3cb07c34cd90e728dd976276dcac207a5af60457b4ed973bf9f88d8ec4159a224daa6147ab25af9e069f2c267ff4e2afefb8e26c18a1533f5182b7c0ee3729d7e87e4a2ace2603ad6c09187e58c31cf58689285912d4e359aab26490162edb53a1cb5fec2c045a9ed61957a42e420943e10ef8086e18bdae0f0b924e6e73124f3624f6461cbd584af43513c04733679331f0fe18583fcde6447197e8b147f870e081f70963f3f43b210a7b78fafd8130b60846fb055896913f7afaaa7185be8dc10565877abba6adcb3c3426c23e72b225c9778af8a4ad27e66f0af588bdeb522ec6f8d3aef4b60936aea4cae4c1b19efcebc865d10d7653fd40b751acee5c18a170942bc5fdae1c01c13edba25a64c2b2f570c5f1a70b3bf9eeb6f603b36c45785097dbc4127bbfb778317629921db8d8c81e37bd8b29c6f1212669f290067f1738d486a6aa4598688904b5de46471a67096b6724e3255ed28a474d3c89c44a895aad7b2bfe974e365b8b2590f1ad33b606f94a6212674f46fd9289bddf79d6058ef02b13889f888a2937d02a97b44354b4f652fe05e24535b983d21f13b48b767f04ff3655b84d9e163bc8ac29f9d2e8549e6025cdeaca87228a98b2a5c96ed0ca8835ff824be52fc7fb73c0efcff78e3e85df259e48048535ebec17b4b5cccea196a5b778bde3fcfc8307c6e92e68c81eb286b2eec9bbe0c622b7074398e2cef6935f8be98e4b4e287e690ed10069b2d1879c73484f900928ecaad1fd8ebc284454c38ec23eda02a09ecd9957b1dcb634c2d1c774745e1e0f825876c89e11f9ac5f68e4407a3c0a2e7697200a5592e174ea4e04c537f34fdae3e5d8b27373dae33e39081c0bf2f634f123f95cf42f409db25268c33a8146c3da5f4b3b23eade174ea47011b07dee6324027e907f698ee7fb08dc76c7e11b41ea1607446facc19edfc47901a35e4e5e27dc952c093b149ec817c429af530ff2b651e7878d9bae3840ba64706cc0d3eec6b8eabbe9ba7dd8c2f64ead304ae0c20659e6d32ef61c7474a28c7de94c3998f6331f7f47f7bdbcc9eed5756f026594e5345fbf6a0efabf28267ab729eac65c4f1db498744eeb15e1a8b8128acdc638d2fffebd6ed16f1859024829f60acc4d4faed944afb485afcf5d683bfa25390d96278b74a9d093af1861c68d8dbb0cb2ca672a28678afdc20220765a94677cb18023858c23071375a0a03bb2e139b48eb686403d8526694ba93fe0034805e1ad3af4e755a27c7fe8797674d482e2097849f3f158e3fcb2ec5efc2f99e8a19f04cd16a2850f86a2537e91a3221f206a1007c85c5e6ed6b63cf5f4a79e6075d895ab645669769295b219f4166b67d5ae9b18474394bb33a2a782b2dccbbfa3be666874886481ef496e03e67ede35ba64189220f1ab2673ab02c772b87ec32ef5cd6b0546c3face66c2bc00449dc2fd18a15d916e49924263991f4de46571b11d50f501c37df75509734bd12af3f7aa85b1aca3dfbea4ed0ff4f77ea0902e7b40b82967539f117e661c4576d6262ff721cc056d00a9dd61ff5625cb5080497e812f79c1aab30b367191118e1a04a5e28ffb2a9f0485e5d5d89b1223e88b42ea52a1298883cee9bd6ace1f38021eed5ab6707ac44c993258b142ba30faf92290e18bd0b0cc8f7aed991255433c99c5e2d015abfd210817f10b8c918366db155f0b5e05d08adfc249b9e4660e10b39156bac9c994c15a88b730480472b740fcbea988fa5382778f995ae14bf2c48d49ae16d278e70507de10d73466e05d46cf40fc5e2ea9755157e8127ad740846bcd117d2d9a0031400f0f5d3eda8029e3f0c2efdef34518ebd5408aa44383ce412645afd409dfbdad38752ddc699a8e6b3ed86c8c0b93770ea4b16184a773fc89ec680446eb38d6ab86df3b200b2afc3538958c06f0651c6ab8d821177c90828a7b0fcad04d2e6a2f01f64c5339c9a094c26c2b62eb194c636744ee319d6a4dde861f27a25002dd33836f5d3a2b8763fc4416584ca7f648e679c5f7c9b480be78a43f53abf2fad9341a68afab32cbadd10142a450392179440f2b76bc2cdd364814d9ddb1d4461e1ff63b955324460168c972f3f5cea0fa63c7089fa9be79573a230626e38cebbc76644275b9ed6b8cad3ed8a2d3f92b6c149e706445d61a027c673960f4268af7e4280e15187f8eeee4e195b71891e079a7d294b17722f0eb91c99f5e082646d9c42f77e80d67205f7df4d4bc085892444f9c71d321c2e878c415a2f10ebd0d3ead725fc429075fe2bfa8e2257f5c220cd169ed91e7204fc8bf325136e9986eaebebd2c6140556105f44b8860cfd210ac61841b79983464bd983f481dc806cac7f1506739d5a03dfa7c49c6c75109b391fea1f98ba2b0f1ad93e365e26db9a8a02658692c2d951510f7e7256ecd7dadbde46a8bf9c1395cd043c3913dceef3db76f19e7c688d005587922778af74a681507cd5109a48b2664eeb37ff37eba0b4a2ccc884b59eaa96279db14920794597b27540d54dafd2a0552900eee5ed11a338405a9fd05c93cf527cb628766d4a15aca2dd1f28b168042704bac6f70bd634af26f12ecc5e9da31e8406328486ba8be696d8a6923f02bad991c0bb734ef6daa125063b64a12202f481512011fa8325e969594caab798bcbafd1261fbf7f8d620bd0c71c7c674a33b97222203a2eb14a83ff37c0b4c413a22c49eb6c6a9f9fbdd4d6a1e7e322c2cffc70abd4296b8dc97cb2b1ebe159acb7e6d45e1da289e05f18cddd1996ddad36e6297f6cd2c2d61368fe898098ce179f8c07b205abfbe7dccfeaa6ef238ad9e192afeef418e83ba11ea4081963f32de3ee985a19dafa179ba8772a9b352bff22a9051bcc9b6502f1c3f2b4420fda992216b92ec085027d8d859003b897969b0b1695446f27805a5e42bf8c5629d30f8509f1a9146bbcf2b15105b33516d117f90bf34f922e21a7d7120b0ebcab3f311454ee7756a534281f22abd344569f8cd8ec71ceefa0605b723882c4b99c54149c9671761627aaa0268694aaad4a2a5860ad45884eb1afe93544a0923e3f6d52dbfd58d02a468108857a0bd74527d51391a700f5f3b50ce3df5a56b9d3bacbab86e5af61ba9126aa2b4bcc86eae3314c6c60d8f9cd69d486b1c8f65fc449e6965c6937505905317184d0856fc9e5f9c40beb146871d7bc984950db644f2388486220eabdb6fae3b03cf175edddc991fd9a2db55fab238e9c064d9202dd4c36d983060ee789764415295a3d1ee1d714eb91194c17fc3e32b061e81189c4e1e476eecea7d3135e6547b9683a7615363f3b88a7717ca06ed3c1fa8ea21f67b03d3606ac8bf6be5c396bd4939a56589754a1baef79707eeafeaf4f733ff0ae4170a4df78fb602dc0caa3df87d28fda82d9493c680908ecead9056a44688735b3da6cd8bc49b4f8fc14eaeba4579d5828199f3b1c60712895ef3f61e2f4650b355382acbdb2b83ad312a6f63fbe0cf3e5dafae39bf7a08162c37530b0d09722547f0cfc3d86e8b94ce74692929012cc3b841a4fde9b579a87b68bf5840856148df9abe045c670d311677a7d1002c34771e65834e2ccced71278ad2cefa361cf376659d47e8bc3023513eda4d42abb99aaf96dbfbc857bca5c5c677e27d3bdb7afeeb477a8db41c3e8160f805c9ef0bd5fbbc6098ead9bfbfb9a06566d6053da0864131a11019b57aa767f6a71a94d4493bf5fdf1bc85882235f2b2fd757dc56333076b8641e3a0571687c34df76e89844ec7bbb74bd5a87be1b18e68f0438b9ad825e433e012d7499ed8a5670079d9e06dbc378cbfbebd31aa3fc0cf6a3143897693df42993b7165cbe0e620db648bb9ab23c6f2e8c92689b3e94ef89047799580a678165120dc82c02ea0bc56b8dd15cbcefaa31b5c"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x61}], 0x1048, 0x20000040}, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x3) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x3f) faccessat(r0, &(0x7f0000001640)='./file0\x00', 0x80, 0x800) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:02:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='nt%s\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfl\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(r0, r1, 0x7fffe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:02:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r8 = geteuid() fstat(r2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getuid() fstat(r2, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() getgroups(0x2, &(0x7f0000000600)=[0x0, 0xffffffffffffffff]) r14 = getegid() r15 = getegid() getresgid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) getgroups(0x4, &(0x7f0000000800)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00]) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=r7, @ANYBLOB="02000500", @ANYRES32=r8, @ANYBLOB="02000600", @ANYRES32=r9, @ANYBLOB="02000100", @ANYRES32=r10, @ANYBLOB="02000200", @ANYRES32=r11, @ANYBLOB="04000200000000000800050054847704f55a0d01ae3dbbf6", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r13, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="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", @ANYRES32=r16, @ANYBLOB="08000300", @ANYRES32=r17, @ANYBLOB="08000200", @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r19, @ANYBLOB="10000200000000002000030000000000"], 0x9c, 0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x7, 0x4) io_destroy(r4) 20:02:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfo\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf\n\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfp\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf#\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:21 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x222040, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:02:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f00000001c0)=""/82) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f0000000040)={0x4000000000001, 0x7}) socket$caif_stream(0x25, 0x1, 0x3) personality(0x404000b) io_destroy(r3) 20:02:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfu\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf%\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x191) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:21 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000480)={0x8, 0x7, 0x40}) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xd, 0x200000000101f, r0, 0xfffffffffffffffc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000200)=0xe8) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000003c0)=0x2, 0x4) r2 = getgid() ioctl$sock_proto_private(r0, 0x89ef, &(0x7f0000000440)="c0750025c02c7d659c245c4030d3b1c0e384d44cd8737b65fe773933eebf3f1982b97af841a9130ecf88a96b966b7fb1672b") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e21, 0x1ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}, 0x1, 0x4, 0x3, 0x0, 0x1}, &(0x7f0000000580)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000005c0)={r3, 0x7f}, 0x8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/dsp\x00'}}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}}) pipe2$9p(&(0x7f0000000400), 0x80000) 20:02:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfx\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf*\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) 20:02:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x02', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf+\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x03', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf-\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1ae) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:22 executing program 3: chmod(&(0x7f0000000040)='./file0\x00', 0x108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="335de07f3d3cf8dfc4cc45c5e1faf483f4fe371d2145210ce65e9ca183fa0d8f8eee8cdf68d3a33a1235d4303f8b74f97c108a746df099fd5a1b6c4bbd7aacde402794afe8af65865bfe38f869d51a515c123df6afadfc32afea96275a", 0x5d, 0x0) r5 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='\xd2%vmnet0keyringcgroup{ppp1mime_type\x00', 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000400)={0x0, 0x3, 0x4, [0x7, 0xfffffffffffff9f3, 0x81, 0x10001]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={r6, @in6={{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x1f}, 0x8}}}, 0x84) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000280)='rxrpc\x00', &(0x7f00000003c0)=@keyring={'key_or_keyring:', r5}) 20:02:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:22 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5db1c1d7, 0x10000) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:02:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf.\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x04', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80, 0x0) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x2, 0x10001, 0x0, 0x8000}]}) r3 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xffffffff00000000, 0x48, 0x40, 0x8}, {0x0, 0x4, 0x6, 0xde0}, {0x8, 0x1, 0x8, 0x6}, {0xffffffffffffffeb, 0x9, 0x27, 0x366e}, {0x10000, 0x3, 0xffffffff, 0x40}, {0x2, 0x2, 0x4, 0x1f}]}) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) 20:02:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x05', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf0\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) io_getevents(r3, 0x4, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:02:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x06', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfX\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:32 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:02:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1ae) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x800000000000094, &(0x7f0000000040)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:02:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfc\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\a', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfd\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)) 20:02:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\n', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:40 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x7, 0x811, r0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x306}, 0x52, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 'hsr0\x00'}) getsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:02:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfi\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, 0x0, 0xfe15) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) connect$unix(r1, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000280)={0x80000000, 0x7}) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f00000001c0)) io_destroy(r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)={0x1, [0x0]}, &(0x7f0000000240)=0x8) 20:02:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x0e', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1ae) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000040)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) ioctl$VT_RELDISP(r2, 0x5605) io_destroy(r3) 20:02:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x10', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfl\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:50 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x183) mmap$binder(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x7, 0x1033, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x10, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@aname={'aname', 0x3d, '-.\''}}, {@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}, {@privport='privport'}, {@noextend='noextend'}, {@afid={'afid', 0x3d, 0x140}}, {@afid={'afid', 0x3d, 0xe8}}], [{@euid_eq={'euid', 0x3d, r1}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/dsp\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/dsp\x00'}}, {@hash='hash'}, {@appraise='appraise'}, {@permit_directio='permit_directio'}]}}) linkat(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file0\x00', 0x1000) 20:02:50 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000cc0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000e00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2440040}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x88, r5, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4c8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xb}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r3}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x545}]}, 0x88}}, 0x20000000) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) fsetxattr$security_selinux(r2, &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:systemd_logind_exec_t:s0\x00', 0x2b, 0x2) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000c80)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18080000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb8, r6, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9727}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa8}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x8000}, 0x0) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) write$binfmt_elf32(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x75e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000b40)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x1}}, 0x9, 0x10000, 0x1, 0x3, 0x4}, &(0x7f0000000c00)=0x98) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000c40)=@assoc_value={r7, 0x200}, 0x8) io_destroy(r4) 20:02:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfsH', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfo\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1bc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfp\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7fffffff, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f00000001c0)=""/61, 0x4000, 0x1000, 0x1}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000040)=0x3f) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) 20:02:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfsL', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:51 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7, 0x1013, r0, 0x0) 20:02:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs`', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfu\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_setup(0x5b2, &(0x7f0000000080)) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x5, r2, 0x1}) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:02:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1bc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:02:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfx\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:02:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfsh', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:02:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:02:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400201) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x19e, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0xfffffffffffffd31, 0x0, 0x0, 0x0, r2}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) connect$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0x3, 0x1, 0x3, 0x5, 0x637, 0x2401}, 0x2}, 0xa) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000080)={0x5, 0x400, 0x5, 0x1, 0x4}) io_destroy(r3) 20:03:00 executing program 5: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x6, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:03:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfsl', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf\xb2\x02', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x7, 0x4) io_destroy(r3) 20:03:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00db3e34f9fac2b839eb3455d72f9527de4211d4e737ff10bf66a096b93cc21f3b6ae8a1209b80de849500000000000000000047a18a4e5aeca69944f20da3fcb4af4e0076ccc73f13f0f19107a88840d2d0e930428c72311e2554b6677bee65e4aff0c176d6c0b07664c9535715c793d8550f79df54df982a71ff26e29717c73b208b44fc533d06e240946426cd74aae2fef12c9b9e6f85469b44528f4b5c7bafb724822f5bc1c6d366380679fb07e1fa9c3ffb51385c1cb67f741bea419ede239edcac8387e270a79e20308d77d64bd72a84d570801d3962c50fc2a990ffffffffffffff07bbd664d216a207e1d7b2a8be0ee3cdc71f3ae039786edbfeb36b469e174b2bbaab1a9fbf7ab0a6bdb9d8292b2ed13820dee5efdbacb74c365d5e1453f90aa7da053108ba78671998ce0917b5f9d6ca71fb740d9a792926af43887833769dc96316f181dd0a4a2313f5a36ff57bb26d77be53d718504c4f964482d081818ac10b750e22a5217936e526fc349b69463bd189d4ab1f4e1cadbcc54e61e2a1693d4d898c0fe0a9239b7cdc4ca43ea28be7caf0818e052b0f1c6d13a42f8549210eb4c3feff039b648c6e8a50d405566cceaf25de6f1f0c62"], 0x1bc) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:03:00 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000000c0)={0x90, 0x2, {0x0, 0x2, 0x100000fff, 0x0, 0x2}}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r1, 0x0) 20:03:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e23, @empty}}, [0x4f58, 0x0, 0x0, 0x7fff, 0x1, 0x5, 0x5, 0x70d, 0xa8d, 0x2aaa, 0x4, 0xffffffffffff7fff, 0x7, 0x6]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r4, 0x4) io_getevents(r3, 0x4, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x0, 0x1c9c380}) io_destroy(r3) connect(r1, &(0x7f0000000040)=@x25={0x9, @remote={[], 0x3}}, 0x80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000400)={0x100000001, 0x0, {0xffffffffffffffff, 0x3, 0x0, 0x1, 0x4}}) [ 480.965139][T24146] QAT: Invalid ioctl 20:03:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntf\xec\x02', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfst', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) write$cgroup_int(r2, &(0x7f0000000040)=0x1, 0x12) io_destroy(r3) 20:03:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfsz', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x02', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 481.757507][T24153] QAT: Invalid ioctl 20:03:09 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0xfff, 0x0, 0x5, 0x20000000003}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:03:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:03:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x13', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x03', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:03:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x04', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xf1, 0x240101) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000300)=""/234) r3 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000240)={0x1, 0x4}, 0x2) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x8) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) recvfrom$unix(r1, &(0x7f00000001c0)=""/65, 0x41, 0x40010000, 0x0, 0x0) io_destroy(r4) 20:03:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) [ 490.317513][T24256] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 20:03:18 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ftruncate(r0, 0x1ff) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:03:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x05', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:03:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) rt_sigqueueinfo(r2, 0x17, &(0x7f00000001c0)={0x1b, 0x3, 0x8}) r3 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r4, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, 0x0, 0x27c}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) 20:03:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) [ 499.102968][T24287] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 20:03:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000040)={&(0x7f0000fee000/0x11000)=nil, 0x3, 0x3, 0x8, &(0x7f0000ffe000/0x1000)=nil, 0x1}) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1bb, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x27c}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:03:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x06', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 499.481696][T24326] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 20:03:27 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) 20:03:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0xff, &(0x7f0000000140)=0x0) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x3, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) io_getevents(r3, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r3) 20:03:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\a', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) 20:03:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1c7) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 20:03:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) [ 508.022268][T24344] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 20:03:28 executing program 5: r0 = dup(0xffffffffffffffff) recvfrom$x25(r0, &(0x7f0000000000), 0x0, 0x2042, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r1, 0x100000000000000) 20:03:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\x00', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:03:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000680)='ntfs\n', &(0x7f00000006c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) 20:03:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) [ 508.279126][T24374] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 20:03:28 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0xfffffdb4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0x1013, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) fchown(r1, r2, r3) 20:03:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r1, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(0x0, 0x35) [ 666.352801][ T1042] INFO: task syz-executor.3:24361 blocked for more than 143 seconds. [ 666.361000][ T1042] Not tainted 5.1.0-rc3-next-20190402 #16 [ 666.367764][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 666.376545][ T1042] syz-executor.3 D30216 24361 7624 0x00000004 [ 666.383006][ T1042] Call Trace: [ 666.386382][ T1042] __schedule+0x817/0x1cc0 [ 666.390985][ T1042] ? trace_hardirqs_off+0x62/0x220 [ 666.396296][ T1042] ? kasan_check_read+0x11/0x20 [ 666.401305][ T1042] ? __sched_text_start+0x8/0x8 [ 666.406913][ T1042] ? __lock_acquire+0x548/0x3fb0 [ 666.411916][ T1042] schedule+0x92/0x180 [ 666.416073][ T1042] schedule_timeout+0x717/0xc50 [ 666.420978][ T1042] ? wait_for_completion+0x294/0x440 [ 666.426563][ T1042] ? find_held_lock+0x35/0x130 [ 666.431462][ T1042] ? usleep_range+0x170/0x170 [ 666.436238][ T1042] ? kasan_check_write+0x14/0x20 [ 666.441216][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 666.446634][ T1042] ? wait_for_completion+0x294/0x440 [ 666.452037][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 666.457352][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 666.462693][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 666.467865][ T1042] ? kasan_check_read+0x11/0x20 [ 666.472958][ T1042] wait_for_completion+0x29c/0x440 [ 666.478142][ T1042] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 666.484805][ T1042] ? wake_up_q+0xf0/0xf0 [ 666.489103][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.495445][ T1042] ? kasan_check_read+0x11/0x20 [ 666.500398][ T1042] __x64_sys_io_destroy+0x373/0x420 [ 666.505676][ T1042] ? __x32_compat_sys_io_setup+0x410/0x410 [ 666.511529][ T1042] ? do_syscall_64+0x26/0x610 [ 666.516325][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 666.521734][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 666.526921][ T1042] do_syscall_64+0x103/0x610 [ 666.531554][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.538072][ T1042] RIP: 0033:0x4582b9 [ 666.541986][ T1042] Code: 42 08 48 89 04 24 e8 c6 ee fc ff 48 8b 6c 24 08 48 83 c4 10 c3 e8 07 1c 00 00 eb c5 cc cc cc cc cc 64 48 8b 0c 25 f8 ff ff ff <48> 3b 61 10 0f 86 9b 00 00 00 48 83 ec 28 48 89 6c 24 20 48 8d 6c [ 666.561768][ T1042] RSP: 002b:00007f7674311c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000cf [ 666.570810][ T1042] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00000000004582b9 [ 666.578889][ T1042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f7674313000 [ 666.587027][ T1042] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 666.595097][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f76743126d4 [ 666.603213][ T1042] R13: 00000000004bf3f1 R14: 00000000004d1148 R15: 00000000ffffffff [ 666.611251][ T1042] [ 666.611251][ T1042] Showing all locks held in the system: [ 666.619155][ T1042] 1 lock held by khungtaskd/1042: [ 666.624232][ T1042] #0: 00000000bfd4c868 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 666.633688][ T1042] 2 locks held by getty/7580: [ 666.638387][ T1042] #0: 000000005cca374e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.647548][ T1042] #1: 0000000078acfda0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.657321][ T1042] 2 locks held by getty/7581: [ 666.662014][ T1042] #0: 00000000259cd289 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.671605][ T1042] #1: 0000000085b822a2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.681929][ T1042] 2 locks held by getty/7582: [ 666.686680][ T1042] #0: 00000000ea86304b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.695720][ T1042] #1: 0000000080fc2c05 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.705400][ T1042] 2 locks held by getty/7583: [ 666.710111][ T1042] #0: 000000002eaee0b3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.719277][ T1042] #1: 000000001b839b60 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.728924][ T1042] 2 locks held by getty/7584: [ 666.733691][ T1042] #0: 0000000009e95c16 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.742725][ T1042] #1: 00000000492d4478 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.752393][ T1042] 2 locks held by getty/7585: [ 666.757271][ T1042] #0: 00000000bdd20c4f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.766430][ T1042] #1: 0000000057ecfe74 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.776126][ T1042] 2 locks held by getty/7586: [ 666.780827][ T1042] #0: 00000000c810b2ee (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.789890][ T1042] #1: 00000000d531aa98 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.799990][ T1042] 2 locks held by syz-executor.1/14305: [ 666.805584][ T1042] #0: 000000008fb7cbd6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 666.814715][ T1042] #1: 0000000050d83968 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 666.824483][ T1042] [ 666.826956][ T1042] ============================================= [ 666.826956][ T1042] [ 666.835535][ T1042] NMI backtrace for cpu 0 [ 666.840017][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3-next-20190402 #16 [ 666.848677][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.858950][ T1042] Call Trace: [ 666.862237][ T1042] dump_stack+0x172/0x1f0 [ 666.866663][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 666.871987][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 666.877697][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 666.883673][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 666.889697][ T1042] watchdog+0x9b7/0xec0 [ 666.893863][ T1042] kthread+0x357/0x430 [ 666.897931][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 666.903551][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 666.909774][ T1042] ret_from_fork+0x3a/0x50 [ 666.914313][ T1042] Sending NMI from CPU 0 to CPUs 1: [ 666.919778][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 666.920699][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 666.934871][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc3-next-20190402 #16 [ 666.943527][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.953687][ T1042] Call Trace: [ 666.957285][ T1042] dump_stack+0x172/0x1f0 [ 666.961674][ T1042] panic+0x2cb/0x65c [ 666.965682][ T1042] ? __warn_printk+0xf3/0xf3 [ 666.970543][ T1042] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 666.976448][ T1042] ? printk_safe_flush+0xf2/0x140 [ 666.981486][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.987726][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 666.993436][ T1042] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 666.999680][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 667.005830][ T1042] watchdog+0x9c8/0xec0 [ 667.010180][ T1042] kthread+0x357/0x430 [ 667.014250][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 667.019798][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 667.026094][ T1042] ret_from_fork+0x3a/0x50 [ 667.031582][ T1042] Kernel Offset: disabled [ 667.036038][ T1042] Rebooting in 86400 seconds..