[   57.663052][   T25] audit: type=1800 audit(1555064856.531:21): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0
[   57.696983][   T25] audit: type=1800 audit(1555064856.531:22): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0
[   57.723586][   T25] audit: type=1800 audit(1555064856.541:23): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rsyslog" dev="sda1" ino=2442 res=0
[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts.
2019/04/12 10:27:47 fuzzer started
2019/04/12 10:27:51 dialing manager at 10.128.0.26:43643
2019/04/12 10:27:51 syscalls: 2408
2019/04/12 10:27:51 code coverage: enabled
2019/04/12 10:27:51 comparison tracing: enabled
2019/04/12 10:27:51 extra coverage: extra coverage is not supported by the kernel
2019/04/12 10:27:51 setuid sandbox: enabled
2019/04/12 10:27:51 namespace sandbox: enabled
2019/04/12 10:27:51 Android sandbox: /sys/fs/selinux/policy does not exist
2019/04/12 10:27:51 fault injection: enabled
2019/04/12 10:27:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/04/12 10:27:51 net packet injection: enabled
2019/04/12 10:27:51 net device setup: enabled
10:28:46 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

syzkaller login: [  127.619547][ T9060] IPVS: ftp: loaded support on port[0] = 21
10:28:46 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00fb1505007b9eec"], 0x1, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffebc)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  127.705390][ T9060] chnl_net:caif_netlink_parms(): no params data found
[  127.764452][ T9060] bridge0: port 1(bridge_slave_0) entered blocking state
[  127.777552][ T9060] bridge0: port 1(bridge_slave_0) entered disabled state
[  127.785362][ T9060] device bridge_slave_0 entered promiscuous mode
[  127.804663][ T9063] IPVS: ftp: loaded support on port[0] = 21
[  127.811465][ T9060] bridge0: port 2(bridge_slave_1) entered blocking state
[  127.819096][ T9060] bridge0: port 2(bridge_slave_1) entered disabled state
[  127.826896][ T9060] device bridge_slave_1 entered promiscuous mode
[  127.845003][ T9060] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  127.857285][ T9060] bond0: Enslaving bond_slave_1 as an active interface with an up link
10:28:46 executing program 2:
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
fcntl$getownex(0xffffffffffffffff, 0x3, 0x0)
r0 = gettid()
setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240))
setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0)
pread64(0xffffffffffffffff, 0x0, 0x3e, 0x0)
tkill(r0, 0x1000000000016)

[  127.899792][ T9060] team0: Port device team_slave_0 added
[  127.906718][ T9060] team0: Port device team_slave_1 added
[  127.999540][ T9060] device hsr_slave_0 entered promiscuous mode
[  128.037796][ T9060] device hsr_slave_1 entered promiscuous mode
10:28:46 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
close(r0)

[  128.175476][ T9066] IPVS: ftp: loaded support on port[0] = 21
[  128.177587][ T9063] chnl_net:caif_netlink_parms(): no params data found
[  128.215370][ T9068] IPVS: ftp: loaded support on port[0] = 21
[  128.250269][ T9063] bridge0: port 1(bridge_slave_0) entered blocking state
[  128.258341][ T9063] bridge0: port 1(bridge_slave_0) entered disabled state
[  128.266105][ T9063] device bridge_slave_0 entered promiscuous mode
[  128.283596][ T9060] bridge0: port 2(bridge_slave_1) entered blocking state
[  128.290726][ T9060] bridge0: port 2(bridge_slave_1) entered forwarding state
10:28:47 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0)

[  128.298140][ T9060] bridge0: port 1(bridge_slave_0) entered blocking state
[  128.305173][ T9060] bridge0: port 1(bridge_slave_0) entered forwarding state
[  128.319177][ T9063] bridge0: port 2(bridge_slave_1) entered blocking state
[  128.326244][ T9063] bridge0: port 2(bridge_slave_1) entered disabled state
[  128.339443][ T9063] device bridge_slave_1 entered promiscuous mode
[  128.431267][ T9063] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  128.476312][ T9063] bond0: Enslaving bond_slave_1 as an active interface with an up link
10:28:47 executing program 5:
r0 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, 0x0)
r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x0)
semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000080)=""/20)
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22}}, 0x0, 0x82b5}, 0x0)
semctl$IPC_RMID(0x0, 0x0, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$void(r1, 0xc0045878)
ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)={[0x0, 0x4, 0x2001], 0x0, 0xd8, 0x7})
shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000540)=""/32)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
rt_sigprocmask(0x0, &(0x7f0000000240)={0x6}, 0x0, 0x8)

[  128.561880][ T9073] IPVS: ftp: loaded support on port[0] = 21
[  128.571712][ T9060] 8021q: adding VLAN 0 to HW filter on device bond0
[  128.600366][ T9068] chnl_net:caif_netlink_parms(): no params data found
[  128.625070][ T9060] 8021q: adding VLAN 0 to HW filter on device team0
[  128.634029][ T9063] team0: Port device team_slave_0 added
[  128.643892][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  128.657792][ T2988] bridge0: port 1(bridge_slave_0) entered disabled state
[  128.668892][ T2988] bridge0: port 2(bridge_slave_1) entered disabled state
[  128.676508][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  128.697542][ T9063] team0: Port device team_slave_1 added
[  128.716315][ T9066] chnl_net:caif_netlink_parms(): no params data found
[  128.809502][ T9063] device hsr_slave_0 entered promiscuous mode
[  128.867828][ T9063] device hsr_slave_1 entered promiscuous mode
[  128.907856][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  128.917039][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  128.926548][ T9075] bridge0: port 1(bridge_slave_0) entered blocking state
[  128.935005][ T9075] bridge0: port 1(bridge_slave_0) entered forwarding state
[  128.944606][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  128.953198][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  128.961910][ T9075] bridge0: port 2(bridge_slave_1) entered blocking state
[  128.969007][ T9075] bridge0: port 2(bridge_slave_1) entered forwarding state
[  128.976532][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  128.985088][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  128.996693][ T9076] IPVS: ftp: loaded support on port[0] = 21
[  129.000279][ T9060] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  129.013460][ T9060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  129.025005][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.033260][ T9068] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.041058][ T9068] device bridge_slave_0 entered promiscuous mode
[  129.079313][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  129.088063][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  129.096763][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  129.105433][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  129.113700][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  129.122009][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  129.130497][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  129.138778][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  129.146906][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  129.156080][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  129.164054][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.171192][ T9068] bridge0: port 2(bridge_slave_1) entered disabled state
[  129.179040][ T9068] device bridge_slave_1 entered promiscuous mode
[  129.203265][ T9068] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  129.212409][ T9073] chnl_net:caif_netlink_parms(): no params data found
[  129.230521][ T9068] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  129.260257][ T9066] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.267398][ T9066] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.275910][ T9066] device bridge_slave_0 entered promiscuous mode
[  129.284549][ T9066] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.292207][ T9066] bridge0: port 2(bridge_slave_1) entered disabled state
[  129.300481][ T9066] device bridge_slave_1 entered promiscuous mode
[  129.309276][ T9068] team0: Port device team_slave_0 added
[  129.318932][ T9068] team0: Port device team_slave_1 added
[  129.389189][ T9068] device hsr_slave_0 entered promiscuous mode
[  129.427881][ T9068] device hsr_slave_1 entered promiscuous mode
[  129.492587][ T9073] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.499779][ T9073] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.507590][ T9073] device bridge_slave_0 entered promiscuous mode
[  129.514891][ T9073] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.522009][ T9073] bridge0: port 2(bridge_slave_1) entered disabled state
[  129.529641][ T9073] device bridge_slave_1 entered promiscuous mode
[  129.543638][ T9066] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  129.568963][ T9066] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  129.586476][ T9060] 8021q: adding VLAN 0 to HW filter on device batadv0
[  129.604247][ T9073] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  129.616700][ T9073] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  129.631357][ T9063] 8021q: adding VLAN 0 to HW filter on device bond0
[  129.644720][ T9066] team0: Port device team_slave_0 added
[  129.656309][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state
[  129.663444][ T9068] bridge0: port 2(bridge_slave_1) entered forwarding state
[  129.670766][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state
[  129.677849][ T9068] bridge0: port 1(bridge_slave_0) entered forwarding state
[  129.692977][ T2988] bridge0: port 1(bridge_slave_0) entered disabled state
[  129.701038][ T2988] bridge0: port 2(bridge_slave_1) entered disabled state
10:28:48 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

[  129.735164][ T9066] team0: Port device team_slave_1 added
10:28:48 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

[  129.785980][ T9073] team0: Port device team_slave_0 added
[  129.793386][ T9073] team0: Port device team_slave_1 added
[  129.814287][ T9063] 8021q: adding VLAN 0 to HW filter on device team0
10:28:48 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:48 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000700), 0xdd, 0x0)

10:28:48 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000700), 0xdd, 0x0)

[  129.869685][ T9073] device hsr_slave_0 entered promiscuous mode
[  129.909110][ T9073] device hsr_slave_1 entered promiscuous mode
10:28:48 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000000700), 0xdd, 0x0)

10:28:48 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

[  129.979824][ T9066] device hsr_slave_0 entered promiscuous mode
[  130.007841][ T9066] device hsr_slave_1 entered promiscuous mode
[  130.048523][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  130.056152][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  130.065724][ T9076] chnl_net:caif_netlink_parms(): no params data found
[  130.086767][ T9063] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  130.097892][ T9063] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  130.121473][ T9068] 8021q: adding VLAN 0 to HW filter on device bond0
[  130.132276][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  130.142197][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  130.150517][ T9075] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.157593][ T9075] bridge0: port 1(bridge_slave_0) entered forwarding state
[  130.165263][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  130.174081][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  130.182519][ T9075] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.189589][ T9075] bridge0: port 2(bridge_slave_1) entered forwarding state
[  130.197059][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  130.205896][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  130.214532][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  130.223173][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  130.231626][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  130.240348][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  130.248798][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  130.256904][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  130.265236][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  130.273643][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  130.285508][ T9063] 8021q: adding VLAN 0 to HW filter on device batadv0
[  130.301046][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  130.309970][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  130.317937][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  130.352352][ T9068] 8021q: adding VLAN 0 to HW filter on device team0
[  130.369609][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  130.381937][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  130.390669][ T9108] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.
[  130.425514][ T9066] 8021q: adding VLAN 0 to HW filter on device bond0
[  130.450315][ T9076] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.457755][ T9076] bridge0: port 1(bridge_slave_0) entered disabled state
[  130.465579][ T9076] device bridge_slave_0 entered promiscuous mode
[  130.494279][ T9073] 8021q: adding VLAN 0 to HW filter on device bond0
[  130.508449][ T9066] 8021q: adding VLAN 0 to HW filter on device team0
[  130.518861][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  130.527333][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  130.535690][   T43] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.542765][   T43] bridge0: port 1(bridge_slave_0) entered forwarding state
[  130.550567][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  130.559165][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  130.567359][   T43] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.574432][   T43] bridge0: port 2(bridge_slave_1) entered forwarding state
[  130.582232][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  130.589945][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  130.597605][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  130.606082][ T9076] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.616909][ T9076] bridge0: port 2(bridge_slave_1) entered disabled state
[  130.624846][ T9076] device bridge_slave_1 entered promiscuous mode
10:28:49 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070")
getsockopt$sock_buf(r1, 0x1, 0x1e, &(0x7f0000000240)=""/4096, &(0x7f0000000040)=0x1000)
r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000700)={0x0, 0xa000})
syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7a)
ioctl$KVM_NMI(r3, 0xae9a)
openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

[  130.658923][ T9076] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  130.680703][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  130.689328][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  130.698343][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  130.708578][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  130.717079][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  130.732709][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state
[  130.739862][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state
[  130.747450][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  130.755841][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  130.764286][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  130.772813][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  130.781171][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state
[  130.788285][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state
[  130.795991][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  130.806772][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  130.815408][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  130.824411][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  130.832408][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  130.842941][ T9076] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  130.855056][ T9073] 8021q: adding VLAN 0 to HW filter on device team0
[  130.869697][ T9068] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  130.883603][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  130.892335][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  130.901080][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  130.912654][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  130.925274][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  130.936005][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  130.945497][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  130.955505][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  130.964298][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  130.982235][ T9066] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  130.993591][ T9066] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  131.011376][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  131.020214][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  131.028610][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  131.036786][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  131.045294][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  131.053793][ T9075] bridge0: port 1(bridge_slave_0) entered blocking state
[  131.060901][ T9075] bridge0: port 1(bridge_slave_0) entered forwarding state
[  131.068733][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  131.076977][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  131.085183][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  131.093620][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  131.101931][ T9075] bridge0: port 2(bridge_slave_1) entered blocking state
[  131.109002][ T9075] bridge0: port 2(bridge_slave_1) entered forwarding state
[  131.117000][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  131.125325][ T9075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  131.134087][ T9076] team0: Port device team_slave_0 added
[  131.143409][ T9076] team0: Port device team_slave_1 added
[  131.155138][ T9066] 8021q: adding VLAN 0 to HW filter on device batadv0
[  131.177182][ T9068] 8021q: adding VLAN 0 to HW filter on device batadv0
[  131.196443][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  131.205198][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  131.214126][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  131.224118][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  131.232606][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  131.246662][ T9073] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  131.257317][ T9073] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  131.293308][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  131.302269][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  131.311520][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  131.319916][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  131.328437][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  131.339260][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  131.348683][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  131.365429][ T9073] 8021q: adding VLAN 0 to HW filter on device batadv0
10:28:50 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0xe)
wait4(0x0, 0x0, 0x0, 0x0)

10:28:50 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

[  131.419899][ T9076] device hsr_slave_0 entered promiscuous mode
[  131.472149][ T9076] device hsr_slave_1 entered promiscuous mode
[  131.479370][ T9133] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
[  131.560572][ T9076] 8021q: adding VLAN 0 to HW filter on device bond0
[  131.584198][    C0] hrtimer: interrupt took 26138 ns
[  131.592509][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  131.600942][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  131.613638][ T9076] 8021q: adding VLAN 0 to HW filter on device team0
[  131.625111][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  131.636830][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  131.646077][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state
[  131.653181][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state
10:28:50 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0)

[  131.676862][ T9076] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  131.690472][ T9076] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  131.703413][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  131.716751][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  131.735641][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  131.747544][ T9069] bridge0: port 2(bridge_slave_1) entered blocking state
[  131.754920][ T9069] bridge0: port 2(bridge_slave_1) entered forwarding state
[  131.765734][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  131.774574][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  131.786246][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  131.795171][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  131.808495][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  131.816957][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  131.825747][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
10:28:50 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:28:50 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0)
truncate(&(0x7f0000000180)='./bus\x00', 0x9)

10:28:50 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
close(r0)

10:28:50 executing program 0:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:50 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0)

[  131.833604][ T9069] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  131.856316][ T9076] 8021q: adding VLAN 0 to HW filter on device batadv0
10:28:50 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0)
truncate(&(0x7f0000000180)='./bus\x00', 0x9)

10:28:50 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x1e, 0x0, 0x0)
msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/146)

10:28:50 executing program 0:
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:50 executing program 3:
syz_emit_ethernet(0x6e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x5, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x29, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0)

10:28:53 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0xe)
wait4(0x0, 0x0, 0x0, 0x0)

10:28:53 executing program 0:
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:53 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000100)=""/146)

10:28:53 executing program 1:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffffff}]})
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = open(&(0x7f00004b8ff8)='./file1\x00', 0x28042, 0x0)
sendfile(r1, r2, 0x0, 0x0)

10:28:53 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)
ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0)

10:28:53 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:28:53 executing program 0:
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

[  134.508179][   T25] kauditd_printk_skb: 7 callbacks suppressed
[  134.508191][   T25] audit: type=1326 audit(1555064933.381:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9198 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ba8a code=0xffff0000
[  134.516403][ T9205] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:28:53 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0xe)
wait4(0x0, 0x0, 0x0, 0x0)

10:28:53 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffffff}]})
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
accept$alg(r0, 0x0, 0x0)

10:28:53 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:53 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  134.632797][   T25] audit: type=1326 audit(1555064933.501:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9214 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ba8a code=0xffff0000
[  134.664529][ T9217] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:28:53 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:53 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0xe)
wait4(0x0, 0x0, 0x0, 0x0)

10:28:53 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:53 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  134.770779][ T9233] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:28:54 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:28:54 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:54 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:28:54 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

[  135.296235][   T25] audit: type=1326 audit(1555064934.161:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9198 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ba8a code=0xffff0000
10:28:54 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

[  135.425294][   T25] audit: type=1326 audit(1555064934.291:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9214 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ba8a code=0xffff0000
10:28:54 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r2 = dup2(r1, r0)
sched_setaffinity(0x0, 0x0, 0x0)
accept4$packet(r2, 0x0, 0x0, 0x0)

10:28:54 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:54 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:54 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  135.567903][ T9262] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  135.586372][ T9262] FAT-fs (loop1): Filesystem has been set read-only
[  135.594153][ T9262] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  136.207882][ T9258] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:28:56 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0xe)

10:28:56 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:56 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x9, 0x20000000000031, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000009c0))

10:28:56 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:28:56 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:28:56 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:28:56 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, 0x0)
preadv(r0, &(0x7f0000000700), 0xdd, 0x0)

10:28:56 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(0xffffffffffffffff, &(0x7f0000000700), 0xdd, 0x0)

10:28:56 executing program 3:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

[  137.823857][ T9301] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:28:56 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(0xffffffffffffffff, &(0x7f0000000700), 0xdd, 0x0)

10:28:56 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:28:56 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(0xffffffffffffffff, &(0x7f0000000700), 0xdd, 0x0)

[  137.994242][ T9309] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  138.042390][ T9309] FAT-fs (loop1): Filesystem has been set read-only
[  138.085967][ T9309] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  138.128258][ T9322] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  138.147551][ T9322] FAT-fs (loop3): Filesystem has been set read-only
[  138.155443][ T9322] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  138.170069][ T9322] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  138.180237][ T9322] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  138.619941][ T9291] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  138.722094][ T9314] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
10:28:59 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')
ptrace$setopts(0x4206, r0, 0x0, 0x0)

10:28:59 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, 0x0, 0x0, 0x0)

10:28:59 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:28:59 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:28:59 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:28:59 executing program 3:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:28:59 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, 0x0, 0x0, 0x0)

[  140.838075][ T9349] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:28:59 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:28:59 executing program 0:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x7b}], 0x1, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00')
preadv(r0, 0x0, 0x0, 0x0)

[  140.980199][ T9353] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  140.993078][ T9353] FAT-fs (loop3): Filesystem has been set read-only
[  141.006206][ T9353] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  141.015872][ T9353] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
10:28:59 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  141.026706][ T9353] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
10:28:59 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:00 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  141.615397][ T9337] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  141.678188][ T9358] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  141.686208][ T9358] FAT-fs (loop1): Filesystem has been set read-only
[  141.916612][ T9381] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
[  141.924995][ T9381] FAT-fs (loop0): Filesystem has been set read-only
10:29:02 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
gettid()
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:02 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:02 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:02 executing program 3:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffffff}]})
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r2 = dup2(r1, r0)
accept4$packet(r2, 0x0, 0x0, 0x0)

10:29:02 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:02 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:02 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  143.858977][   T25] audit: type=1326 audit(1555064942.731:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9396 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ba8a code=0xffff0000
[  143.874916][ T9408] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:29:02 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:02 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  143.928814][ T9419] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
[  144.012911][ T9411] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  144.043560][ T9428] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:29:02 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  144.061421][ T9411] FAT-fs (loop0): Filesystem has been set read-only
10:29:03 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  144.088454][ T9411] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
[  144.103357][ T9411] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
10:29:03 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:03 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  144.132244][ T9411] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
[  144.150107][ T9436] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:29:03 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  144.234069][ T9442] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:29:03 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000))
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

[  144.648450][ T9398] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
10:29:03 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
write$binfmt_elf32(r0, 0x0, 0x0)

10:29:03 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:03 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:03 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:03 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

[  144.679026][   T25] audit: type=1326 audit(1555064943.551:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9396 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ba8a code=0xffff0000
[  144.710213][ T9412] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  144.718173][ T9412] FAT-fs (loop1): Filesystem has been set read-only
10:29:03 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:03 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x20000000000031, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0))

10:29:03 executing program 2:
creat(0x0, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:03 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:03 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x20000000000031, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080))

[  144.972043][ T9483] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  144.980923][ T9479] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  144.980980][ T9479] FAT-fs (loop0): Filesystem has been set read-only
[  144.981281][ T9479] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
10:29:03 executing program 2:
creat(0x0, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  145.022482][ T9483] FAT-fs (loop1): Filesystem has been set read-only
[  145.032749][ T9483] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:04 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:04 executing program 2:
creat(0x0, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:04 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x1e, 0x4, 0x0)
ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, 0x0)

10:29:04 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:04 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000100)='./file1\x00', 0x0)

10:29:04 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:04 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:04 executing program 3:
syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x20000000000031, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000000c0))

10:29:04 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:04 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:04 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
r1 = getpid()
ptrace(0x10, r1)
ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

[  145.603353][ T9463] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
[  145.615863][ T9472] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:04 executing program 3:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')

10:29:04 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  145.672469][ T9530] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:29:04 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000))
ptrace(0x10, 0x0)
ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:04 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:04 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000))
ptrace(0x10, 0x0)
ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

[  145.853428][ T9548] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  145.896857][ T9553] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  145.915757][ T9553] FAT-fs (loop1): Filesystem has been set read-only
[  145.916118][ T9568] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
[  145.926635][ T9553] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  145.943341][ T9548] FAT-fs (loop0): Filesystem has been set read-only
[  145.978708][ T9548] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
10:29:05 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f2cffffff319bc070")
rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000))
ptrace(0x10, 0x0)
ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:05 executing program 3:
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')

10:29:05 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:05 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)

[  146.505691][ T9534] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500)
10:29:05 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
accept(r1, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000400)=0x80)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:05 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:05 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = getpid()
rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000))
ptrace(0x10, r0)
ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:05 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, 0x0, &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

[  146.552439][ T9585] tmpfs: No value for mount option '�6���]c�e!�?��e��c�Z%�'
10:29:05 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, 0x0, &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:05 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:05 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, 0x0, &(0x7f0000000140)='devtmpfs\x00', 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:05 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40001)
writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="04", 0x1}], 0x1)

10:29:05 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  146.842280][ T9612] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  146.879703][ T9612] FAT-fs (loop1): Filesystem has been set read-only
[  146.888354][ T9612] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  146.920076][ T9612] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  146.928987][ T9612] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:06 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40001)
writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="04", 0x1}], 0x1)

10:29:06 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:06 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:06 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = getpid()
rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000))
ptrace(0x10, r0)
ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

[  147.447736][ T9602] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:06 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:06 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x3, 0x3}, 0x0)

10:29:06 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:06 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40001)
writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="04", 0x1}], 0x1)

10:29:06 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:06 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:06 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)='\x1a\xa86\x8a\x9b\xf8]\x02\x06c\x9a\x11e!\xad?\x9a\xf4e\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f\\\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc6(*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00')

10:29:06 executing program 3:
r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40001)
writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="04", 0x1}], 0x1)

10:29:06 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0)

10:29:06 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  147.794594][ T9665] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0)
10:29:06 executing program 3:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
ppoll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x8000}, {r0, 0x10}, {r0, 0x40}, {0xffffffffffffffff, 0x10}, {r0, 0xa200}, {r0}, {r0, 0x4}], 0x7, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300)={0x1}, 0x8)

[  147.839891][ T9665] FAT-fs (loop1): Filesystem has been set read-only
[  147.884945][ T9665] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:07 executing program 5:
clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = getpid()
rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000))
ptrace(0x10, r0)
ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000002180)={0x0, 0xfcf0})

10:29:07 executing program 1:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)
creat(&(0x7f0000000100)='./file1\x00', 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0x8)

10:29:07 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0)

10:29:07 executing program 0:
pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
stat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000980))
lstat(0x0, &(0x7f0000000bc0))
lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000340))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="a40000f85adcd416bbb11c932090363e5d62cbc967c0014b7fdbf43956c498d74d1bf7542fb643a0755e85309ddf0dff697a284d799425ba3b1ac82db0659417a6312c2ff78fb3f7cf138afb2cc08a07e863fff310"], 0x55)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
unlinkat(r1, &(0x7f0000000440)='./bus\x00', 0x200)
unlinkat(0xffffffffffffffff, 0x0, 0x0)

10:29:07 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:07 executing program 2:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='devtmpfs\x00', 0x0, 0x0)

[  148.438823][ T9652] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:07 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:07 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

10:29:07 executing program 2:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58)
r1 = accept$alg(r0, 0x0, 0x0)
r2 = dup2(r1, r0)
sched_setaffinity(0x0, 0x0, 0x0)
accept4$packet(r2, 0x0, 0x0, 0x0)

[  148.696165][ T9713] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0)
10:29:07 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  148.738220][ T9713] FAT-fs (loop1): Filesystem has been set read-only
[  148.755861][ T9713] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
10:29:07 executing program 4:
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00')
sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000)

[  149.310957][ T9705] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500)
[  301.197860][ T1043] INFO: task syz-executor.3:9688 blocked for more than 143 seconds.
[  301.206070][ T1043]       Not tainted 5.1.0-rc4-next-20190411 #23
[  301.212418][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  301.221125][ T1043] syz-executor.3  D28520  9688   9068 0x00000004
[  301.227682][ T1043] Call Trace:
[  301.231079][ T1043]  __schedule+0x817/0x1cc0
[  301.235618][ T1043]  ? retint_kernel+0x2d/0x2d
[  301.240671][ T1043]  ? __sched_text_start+0x8/0x8
[  301.245540][ T1043]  ? __mutex_lock+0x527/0x1310
[  301.250595][ T1043]  schedule+0x92/0x180
[  301.254853][ T1043]  schedule_preempt_disabled+0x13/0x20
[  301.260348][ T1043]  __mutex_lock+0x726/0x1310
[  301.265034][ T1043]  ? snd_seq_kernel_client_ctl+0xe5/0x170
[  301.270810][ T1043]  ? mutex_trylock+0x1e0/0x1e0
[  301.275622][ T1043]  ? odev_release+0x54/0x80
[  301.280364][ T1043]  ? __fput+0x2e5/0x8d0
[  301.284627][ T1043]  ? ____fput+0x16/0x20
[  301.288887][ T1043]  ? exit_to_usermode_loop+0x273/0x2c0
[  301.294460][ T1043]  ? do_syscall_64+0x52d/0x610
[  301.299556][ T1043]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  301.305666][ T1043]  ? lock_acquire+0x16f/0x3f0
[  301.310580][ T1043]  ? kasan_check_write+0x14/0x20
[  301.315592][ T1043]  ? do_raw_spin_lock+0x12a/0x2e0
[  301.320662][ T1043]  mutex_lock_nested+0x16/0x20
[  301.325447][ T1043]  ? mutex_lock_nested+0x16/0x20
[  301.330417][ T1043]  snd_seq_kernel_client_ctl+0xe5/0x170
[  301.336185][ T1043]  snd_seq_oss_writeq_clear+0xe0/0x140
[  301.341774][ T1043]  ? snd_seq_oss_writeq_wakeup+0xc0/0xc0
[  301.349138][ T1043]  ? snd_seq_oss_timer_delete+0x5a/0x80
[  301.354863][ T1043]  ? create_port+0x250/0x250
[  301.359519][ T1043]  snd_seq_oss_writeq_delete+0x20/0x40
[  301.365267][ T1043]  free_devinfo+0x66/0xc0
[  301.369644][ T1043]  port_delete+0xe8/0x1c0
[  301.373993][ T1043]  snd_seq_delete_port+0x266/0x330
[  301.379178][ T1043]  snd_seq_ioctl_delete_port+0xba/0x190
[  301.384972][ T1043]  snd_seq_kernel_client_ctl+0x112/0x170
[  301.390874][ T1043]  ? snd_seq_info_done+0x30/0x30
[  301.395948][ T1043]  snd_seq_event_port_detach+0xba/0x100
[  301.401907][ T1043]  ? snd_seq_event_port_attach+0x220/0x220
[  301.407758][ T1043]  ? kasan_check_write+0x14/0x20
[  301.412889][ T1043]  ? kfree+0x1bf/0x230
[  301.417227][ T1043]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  301.423121][ T1043]  delete_port+0x87/0xd0
[  301.427823][ T1043]  snd_seq_oss_release+0xf5/0x150
[  301.432860][ T1043]  odev_release+0x54/0x80
[  301.437323][ T1043]  __fput+0x2e5/0x8d0
[  301.441564][ T1043]  ____fput+0x16/0x20
[  301.445653][ T1043]  task_work_run+0x14a/0x1c0
[  301.450404][ T1043]  exit_to_usermode_loop+0x273/0x2c0
[  301.455973][ T1043]  do_syscall_64+0x52d/0x610
[  301.460817][ T1043]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  301.466845][ T1043] RIP: 0033:0x4129e1
[  301.470797][ T1043] Code: e8 34 99 01 00 e9 45 fe ff ff 4c 8b 86 80 00 00 00 4c 39 c3 72 08 48 85 f6 e9 32 fd ff ff 44 0f b6 46 64 41 80 f8 01 74 08 48 <85> f6 e9 1f fd ff ff 0f b7 56 5e 66 85 d2 74 6a 48 29 fb 0f b7 d2
[  301.491195][ T1043] RSP: 002b:00007ffdf8602ad0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  301.500354][ T1043] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004129e1
[  301.508416][ T1043] RDX: 0000001b32720000 RSI: 0000000000000000 RDI: 0000000000000003
[  301.516537][ T1043] RBP: 0000000000740578 R08: 00000000adf569bf R09: 00000000adf569c3
[  301.525954][ T1043] R10: 00007ffdf8602ba0 R11: 0000000000000293 R12: 0000000000000001
[  301.534481][ T1043] R13: 00000000000241a2 R14: 00000000000241cf R15: 000000000073bf0c
[  301.542718][ T1043] INFO: lockdep is turned off.
[  301.547547][ T1043] NMI backtrace for cpu 0
[  301.552037][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23
[  301.560881][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  301.571168][ T1043] Call Trace:
[  301.574515][ T1043]  dump_stack+0x172/0x1f0
[  301.578930][ T1043]  nmi_cpu_backtrace.cold+0x63/0xa4
[  301.584526][ T1043]  ? lapic_can_unplug_cpu.cold+0x38/0x38
[  301.590151][ T1043]  nmi_trigger_cpumask_backtrace+0x1be/0x236
[  301.596119][ T1043]  arch_trigger_cpumask_backtrace+0x14/0x20
[  301.602018][ T1043]  watchdog+0x9b7/0xec0
[  301.606328][ T1043]  kthread+0x357/0x430
[  301.610934][ T1043]  ? reset_hung_task_detector+0x30/0x30
[  301.616689][ T1043]  ? kthread_cancel_delayed_work_sync+0x20/0x20
[  301.622942][ T1043]  ret_from_fork+0x3a/0x50
[  301.627532][ T1043] Sending NMI from CPU 0 to CPUs 1:
[  301.633050][    C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10
[  301.634165][ T1043] Kernel panic - not syncing: hung_task: blocked tasks
[  301.651081][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.1.0-rc4-next-20190411 #23
[  301.659852][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  301.670775][ T1043] Call Trace:
[  301.674182][ T1043]  dump_stack+0x172/0x1f0
[  301.679405][ T1043]  panic+0x2cb/0x72b
[  301.683431][ T1043]  ? __warn_printk+0xf3/0xf3
[  301.688015][ T1043]  ? lapic_can_unplug_cpu.cold+0x38/0x38
[  301.694147][ T1043]  ? ___preempt_schedule+0x16/0x18
[  301.699266][ T1043]  ? nmi_trigger_cpumask_backtrace+0x19e/0x236
[  301.705530][ T1043]  ? nmi_trigger_cpumask_backtrace+0x1fa/0x236
[  301.711790][ T1043]  ? nmi_trigger_cpumask_backtrace+0x204/0x236
[  301.717937][ T1043]  ? nmi_trigger_cpumask_backtrace+0x19e/0x236
[  301.724146][ T1043]  watchdog+0x9c8/0xec0
[  301.728787][ T1043]  kthread+0x357/0x430
[  301.733620][ T1043]  ? reset_hung_task_detector+0x30/0x30
[  301.739175][ T1043]  ? kthread_cancel_delayed_work_sync+0x20/0x20
[  301.745496][ T1043]  ret_from_fork+0x3a/0x50
[  301.751265][ T1043] Kernel Offset: disabled
[  301.755599][ T1043] Rebooting in 86400 seconds..