0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:15 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1)
r1 = accept$alg(r0, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x101, 0x4, {0xfffffffd, 0x0, 0x5}})
r4 = dup(r1)
write$UHID_DESTROY(r4, &(0x7f0000000200), 0xffffff77)
setsockopt(r4, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4)

03:30:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x600}, 0x1c)

03:30:15 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0xffffff9e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  358.985474][T15610] IPVS: ftp: loaded support on port[0] = 21
[  359.169635][ T3797] usb 2-1: new high-speed USB device number 30 using dummy_hcd
03:30:16 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:30:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x700}, 0x1c)

03:30:16 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0xffffffef, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:16 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')

[  359.569380][ T3797] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  359.583667][ T3797] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  359.593568][ T3797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  359.615570][ T3797] usb 2-1: config 0 descriptor??
03:30:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x900}, 0x1c)

03:30:16 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0xfffffff0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  359.679568][  T289] tipc: TX() has been purged, node left!
03:30:16 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1)
r1 = accept$alg(r0, 0x0, 0x0)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x101, 0x4, {0xfffffffd, 0x0, 0x5}})
r4 = dup(r1)
write$UHID_DESTROY(r4, &(0x7f0000000200), 0xffffff77)
setsockopt(r4, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4)

03:30:16 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
setuid(r0)
lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fchown(0xffffffffffffffff, r0, r1)
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')

[  359.889266][T15681] IPVS: ftp: loaded support on port[0] = 21
[  359.969228][ T3797] usbhid 2-1:0.0: can't add hid device: -71
[  359.994665][ T3797] usbhid: probe of 2-1:0.0 failed with error -71
[  360.030301][ T3797] usb 2-1: USB disconnect, device number 30
03:30:17 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xa00}, 0x1c)

03:30:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:17 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r0)
capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)={0x7, 0x1, 0x5, 0xf9d2, 0x80000001, 0x3})
creat(&(0x7f0000000100)='./bus\x00', 0x0)
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')

03:30:17 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:17 executing program 0:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x21a, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}, {{{0x9, 0x5, 0x81, 0x3, 0x400}}}}}]}}]}}, 0x0)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000))
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff})
r4 = socket$nl_route(0x10, 0x3, 0x0)
splice(r3, 0x0, r4, 0x0, 0x1420000a7a, 0x0)
ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)=<r5=>0x0)
ptrace(0x4208, r5)
syz_usb_control_io$hid(r0, 0x0, 0x0)
r6 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000000404c05d50340000000000109022400010000000009040000010301000009210000000122010009058103"], 0x0)
syz_usb_control_io$hid(r6, 0x0, 0x0)
syz_usb_control_io(r6, &(0x7f0000000200)={0x2c, &(0x7f0000000000)={0x0, 0x0, 0x2, {0x2}}, 0x0, 0x0, 0x0, 0x0}, 0x0)
syz_usb_control_io$hid(r6, &(0x7f0000000100)={0x24, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x0}, 0x0)

[  360.698024][T15748] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use)
03:30:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf00}, 0x1c)

03:30:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x2, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:17 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "97a9a2327fdd8a5f", "ac70c7bd480084e732983eb91719fe5a", "57b5e474", "a549e17692f8ae46"}, 0x28)

[  360.968899][ T2474] usb 2-1: new high-speed USB device number 31 using dummy_hcd
[  360.980713][T15746] IPVS: ftp: loaded support on port[0] = 21
03:30:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x3, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c)

[  361.079465][ T3797] usb 1-1: new high-speed USB device number 11 using dummy_hcd
03:30:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  361.279132][ T2474] usb 2-1: device descriptor read/64, error 18
[  361.329087][ T3797] usb 1-1: Using ep0 maxpacket: 16
[  361.470389][ T3797] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  361.512995][ T3797] usb 1-1: New USB device found, idVendor=05ac, idProduct=021a, bcdDevice= 0.40
[  361.586298][ T3797] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  361.626057][ T3797] usb 1-1: config 0 descriptor??
[  361.698936][ T2474] usb 2-1: device descriptor read/64, error 18
[  361.988816][ T2474] usb 2-1: new high-speed USB device number 32 using dummy_hcd
[  362.200263][T15816] udc-core: couldn't find an available UDC or it's busy
[  362.207228][T15816] misc raw-gadget: fail, usb_gadget_probe_driver returned -16
[  362.288874][ T2474] usb 2-1: device descriptor read/64, error 18
[  362.698904][ T2474] usb 2-1: device descriptor read/64, error 18
[  362.798848][  T289] tipc: TX() has been purged, node left!
[  362.820259][ T2474] usb usb2-port1: attempt power cycle
[  362.958951][  T289] tipc: TX() has been purged, node left!
[  363.558900][ T2474] usb 2-1: new high-speed USB device number 33 using dummy_hcd
03:30:20 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2000}, 0x1c)

03:30:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x5, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:20 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:20 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1a, 0x1, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x80, 0x2, 0x8, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0x29, 0x1d, 0x11, 0x16, 0x6, 0xc9, 0x2, 0xdb})
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')
socketpair(0x12, 0x4, 0x70b92ffb, &(0x7f0000000080)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x6, {{0x2, 0x4e23, @multicast2}}}, 0x88)

[  363.688888][ T2474] usb 2-1: device descriptor read/8, error -71
03:30:20 executing program 0:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2ee0}, 0x1c)

[  363.849446][ T3797] usbhid 1-1:0.0: can't add hid device: -71
[  363.855489][ T3797] usbhid: probe of 1-1:0.0 failed with error -71
03:30:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  363.899472][ T2474] usb 2-1: device descriptor read/8, error -71
[  363.956365][ T3797] usb 1-1: USB disconnect, device number 11
[  364.032840][T15828] IPVS: ftp: loaded support on port[0] = 21
03:30:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x4000}, 0x1c)

03:30:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x7, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  364.233769][T15844] IPVS: ftp: loaded support on port[0] = 21
[  364.394465][ T2474] usb 2-1: new high-speed USB device number 34 using dummy_hcd
03:30:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:21 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x4102}, 0x1c)

[  364.495299][ T2474] usb 2-1: Invalid ep0 maxpacket: 0
[  364.501509][ T2474] usb usb2-port1: unable to enumerate USB device
03:30:23 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:23 executing program 5:
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')

03:30:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x9, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:23 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:23 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x5400}, 0x1c)

03:30:23 executing program 5:
perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x1e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
link(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='./bus\x00')

03:30:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xa, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  367.218864][ T3797] usb 2-1: new high-speed USB device number 35 using dummy_hcd
03:30:23 executing program 5:
stat(&(0x7f0000000000)='./bus\x00', &(0x7f00000002c0))
creat(&(0x7f0000000100)='./bus\x00', 0x0)
link(&(0x7f0000000200)='./bus\x00', &(0x7f0000000280)='./bus\x00')
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={<r3=>0x0}, &(0x7f0000000140)=0xc)
ptrace$getsig(0x4202, r3, 0x0, &(0x7f0000000180))

03:30:23 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x5800}, 0x1c)

03:30:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xb, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  367.444161][T15968] IPVS: ftp: loaded support on port[0] = 21
03:30:24 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x80fe}, 0x1c)

[  367.528815][ T3797] usb 2-1: device descriptor read/64, error 18
03:30:24 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xc, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  367.939256][ T3797] usb 2-1: device descriptor read/64, error 18
[  368.208895][ T3797] usb 2-1: new high-speed USB device number 36 using dummy_hcd
[  368.273302][T11021] tipc: TX() has been purged, node left!
[  368.498928][ T3797] usb 2-1: device descriptor read/64, error 18
[  368.898794][ T3797] usb 2-1: device descriptor read/64, error 18
[  369.018989][ T3797] usb usb2-port1: attempt power cycle
03:30:26 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xb804}, 0x1c)

03:30:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xd, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:30:26 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
socket(0x10, 0x2, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:26 executing program 0:
syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="702a3a3ca62f904d6e7891d1ec700fd30b374aba94fd683918ffffffffffff0000000000"])
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00')
sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081)
sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, 'xfs\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x40000)
r4 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r4, 0x0, 0x1420000a7a, 0x0)
ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000040))

[  369.758926][ T3797] usb 2-1: new high-speed USB device number 37 using dummy_hcd
03:30:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  369.868694][T16031] xfs: Unknown parameter 'p*:<�/�Mnx���p�7J���h9������'
03:30:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xc4ff}, 0x1c)

[  370.079774][T16029] IPVS: ftp: loaded support on port[0] = 21
03:30:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  370.271483][T16032] IPVS: ftp: loaded support on port[0] = 21
[  370.279129][ T3797] usb 2-1: device not accepting address 37, error -71
03:30:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe02e}, 0x1c)

03:30:27 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x10, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:27 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe803}, 0x1c)

[  370.649729][T16031] xfs: Unknown parameter 'p*:<�/�Mnx���p�7J���h9������'
[  370.659653][ T3797] usb 2-1: new high-speed USB device number 38 using dummy_hcd
[  370.767216][  T310] tipc: TX() has been purged, node left!
[  370.888996][ T3797] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0
[  370.907296][ T3797] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  370.918308][ T3797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  370.950225][ T3797] usb 2-1: config 0 descriptor??
[  371.010860][ T3797] usbhid 2-1:0.0: couldn't find an input interrupt endpoint
[  371.226207][   T12] usb 2-1: USB disconnect, device number 38
03:30:28 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:28 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x38, r0, 0xa01, 0x40000000, 0x0, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xdc}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:30:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x11, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:28 executing program 0:
write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1)
openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil})
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140), 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="720000001ac26b01a5fcdc4ee452a5f1a91795c6e661dec48759ce94e3bae21999243f4b3ee88939d47b4b8ad196752ddb93011728984ed21c605e0e1f07eb59445f886ba9c4d3861a976011d053a15895c6415f0c927e698960390123679caca83aeb", @ANYRES16=0x0, @ANYBLOB="00002bbd7000fbdbdf25010000000800020053400000050005000100000008000300010400000800030008000000080002000800000014000100000000000000000000000000000000000800020080000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x4000000000000, 0x6, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x1]})
ioctl$KVM_RUN(r0, 0xae80, 0x0)
recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e20, @local}, 0x10)
sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0)
ioctl$KVM_RUN(r0, 0xae80, 0x0)
write$smack_current(0xffffffffffffffff, &(0x7f0000000300)={'/dev/kvm\x00'}, 0xa)
accept$ax25(0xffffffffffffffff, &(0x7f0000000500)={{0x3, @null}, [@bcast, @netrom, @default, @bcast, @bcast, @default, @default, @rose]}, &(0x7f0000000640)=0x48)
openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000740)={[0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]})
ioctl$KVM_RUN(r0, 0xae80, 0x0)

03:30:28 executing program 5:
pipe(&(0x7f0000000100)={<r0=>0xffffffffffffffff})
socket$nl_route(0x10, 0x3, 0x0)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
splice(r0, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
setsockopt(r0, 0x3, 0x4, &(0x7f0000000300)="39592eacd8e7b40bc29beadf16d0e1310436d8d937bb2a616b356307c4c29c1603946efada78d1568615cb444795ad6029eafafa981678d94c293f155c833a725b07ffb63dbfd75355e6a48f567b741bd96a390f53b6255cf0031522d152dc077d516dd00f25bf698a789d61a07e8580af16036dba4df459d4c112c8bf8864dbb81cc46f35cc2ddc536c0f", 0x8b)
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000006d700edff000061115c0000070000400000b000000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48)
setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f00000000c0)=0x1, 0x4)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000b9000000b900000006000000090000000000000c05000000000000000000000300000000020000000500000059d10000080000000000000e0400000001000000050000000800000f010000000100000005000000060000000300000001978c820927a8775d09b1000000020000000400000006000000060000000125ba5bdaa875b3889ab6000000ffffffff000000000300000008000000fdf2cee704010000ff0300000300000001000000e1ffffff1f00000074fd381fa77958fe0400000000000000050000000d0c000000000000070000000007000000000000"], &(0x7f00000001c0)=""/238, 0xda, 0xee}, 0x20)

03:30:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf401}, 0x1c)

03:30:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=""/171, 0xab}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/vlan/config\x00')
preadv(r0, &(0x7f00000017c0), 0x159, 0x300)
r1 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r1)
r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/udplite6\x00')
write$UHID_DESTROY(r2, &(0x7f0000000040), 0x4)

03:30:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x12, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfc00}, 0x1c)

[  372.172026][T16142] IPVS: ftp: loaded support on port[0] = 21
03:30:28 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
dup2(r0, r0)
getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@inode64='inode64'}, {@bsdgroups='bsdgroups'}, {@lazytime='lazytime'}]})
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000280)={0x7, 'team_slave_1\x00', {0x1}, 0x3})
mount$9p_virtio(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f0000000180)={'trans=virtio,', {[{@aname={'aname'}}], [{@dont_measure='dont_measure'}]}})

03:30:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x25, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  372.309228][ T3797] usb 2-1: new high-speed USB device number 39 using dummy_hcd
03:30:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfe80}, 0x1c)

[  372.440486][T16175] 9pnet_virtio: no channels available for device syz
[  372.477129][T16166] XFS (loop0): Invalid superblock magic number
[  372.699221][ T3797] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0
[  372.753837][ T3797] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  372.794566][ T3797] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  372.835543][ T3797] usb 2-1: config 0 descriptor??
[  372.897579][ T3797] usbhid 2-1:0.0: couldn't find an input interrupt endpoint
[  372.914941][T16175] XFS (loop0): Invalid superblock magic number
[  372.960049][T16224] 9pnet_virtio: no channels available for device syz
[  373.098234][ T3796] usb 2-1: USB disconnect, device number 39
[  373.188827][  T310] tipc: TX() has been purged, node left!
[  373.329653][  T310] tipc: TX() has been purged, node left!
03:30:30 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x60, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:30 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff00}, 0x1c)

03:30:30 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00')
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:30 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$KDSETMODE(r1, 0x4b3a, 0x1)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9)

03:30:30 executing program 0:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0xfffffffffffffe8b)
sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x0, 0xf}, [@NDA_LLADDR={0xa, 0x2, @link_local}]}, 0x28}}, 0x0)

[  373.904969][T16246] IPVS: ftp: loaded support on port[0] = 21
03:30:30 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff0f}, 0x1c)

[  374.129016][ T2512] usb 2-1: new high-speed USB device number 40 using dummy_hcd
03:30:30 executing program 0:
perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00')
sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000001880)={0x14, r1, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0)
r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7fffffff, 0x2000)
write$P9_RWRITE(r2, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x8}, 0xb)
ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0)

03:30:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x139, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:30 executing program 5:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$KDSETMODE(r1, 0x4b3a, 0x1)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9)

03:30:30 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffc4}, 0x1c)

[  374.400156][T16270] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
03:30:31 executing program 0:
mkdir(&(0x7f0000000100)='./bus/../file0\x00', 0x0)
mkdir(&(0x7f0000000140)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
pipe(&(0x7f0000000140)={<r4=>0xffffffffffffffff})
r5 = socket$nl_route(0x10, 0x3, 0x0)
splice(r4, 0x0, r5, 0x0, 0x1420000a7a, 0x0)
ioctl$KDSETMODE(r4, 0x4b3a, 0x0)
setfsuid(r3)
mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]})

[  374.533713][ T2512] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0
[  374.579917][ T2512] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  374.591485][ T2512] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  374.602829][ T2512] usb 2-1: config 0 descriptor??
[  374.640986][ T2512] usbhid 2-1:0.0: couldn't find an input interrupt endpoint
[  374.758706][T16308] overlayfs: failed to resolve './file1': -2
[  374.844867][ T2512] usb 2-1: USB disconnect, device number 40
[  375.445017][T16290] overlayfs: failed to resolve './file1': -2
03:30:32 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:32 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400})
r1 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x4000, 0x120, 0x1e}, 0x18)
r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200)='mptcp_pm\x00')
sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x300, 0x93e5, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004820}, 0x8000)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000)=0x3fa, 0x4)
openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x8000, 0x0)
ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000300)={0x200, 0x0, 0x22, "81040e8d5d0402bf32bfa68dbf3ff0ad070423f09f8e687e1d00b30f3c8a39331d60af0428234ac08e3aee77a56666eacf4f874e30541ee9c905f6d6", 0x3, "433f09751eed57f6f1181987cfe98cae62955c04c9826db6b76a567e3390d9ffa6e010b9cf9c2c8ff31ad6e5aa3b8b8324dee7edbe2a93b93407840f", 0x20})

03:30:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x34000}, 0x1c)

03:30:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x300, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:32 executing program 0:
unshare(0x2a000400)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={<r0=>0xffffffffffffffff})
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
dup(r1)
openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x290a00)
r2 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
socket$inet6_sctp(0xa, 0x5, 0x84)
r3 = socket$nl_route(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r4=>0xffffffffffffffff})
r5 = dup(r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r6=>0xffffffffffffffff})
r7 = dup(r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="ce51ad2a6c5b84e6e14489", 0xb}, {&(0x7f0000000180)="8b10f5f802e0b57dca3039831cfe4054b5fe6e06cea5f95cd254412f8e71752391c4dba6cd9532c7cce8bf968286ec41dddee33247bbd85e", 0x38}], 0x2, &(0x7f0000000380)=[@hopopts={{0x68, 0x29, 0x36, {0x16, 0x9, [], [@enc_lim={0x4, 0x1, 0x6}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x20}, @pad1, @calipso={0x7, 0x20, {0x3, 0x6, 0x3, 0x8000, [0x0, 0x1, 0x2]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim={0x4, 0x1, 0x4}]}}}, @dstopts_2292={{0xa0, 0x29, 0x4, {0x5c, 0x10, [], [@generic={0x7, 0x78, "11ba6406e1569cd19fba16d28fec4b35b7ddd70787d244749fee8a59e0591be8c92b9a8304c8a87d4b4d297e2ce2530480c369b176fcd3c0a8a3e2df91459a7a841c16d524780905674edaf15ea6ad3c6e899d7c5ffb0ee5a8d813d2aed438cbf357ba46d5d5a65cec26109a2daeff8ef3b28a2e0f2a7f65"}, @ra={0x5, 0x2, 0xffff}, @enc_lim={0x4, 0x1, 0x33}]}}}, @dstopts={{0x28, 0x29, 0x37, {0x3e, 0x1, [], [@ra={0x5, 0x2, 0x400}, @jumbo={0xc2, 0x4, 0xf9}, @enc_lim={0x4, 0x1, 0x7}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfe}}, @hopopts={{0xe8, 0x29, 0x36, {0x2, 0x19, [], [@enc_lim={0x4, 0x1, 0x1}, @generic={0x0, 0x8, "4f988e952f776321"}, @calipso={0x7, 0x28, {0x2, 0x8, 0x2, 0x8, [0x80000001, 0x992, 0x3, 0x646]}}, @generic={0x6, 0x5a, "6ab39bec8814a1de685d6a8bb12e3773517688fb58e62abeb862288fb69dbbc09e62d4171b90b4ebabb6ddf5f5aae40dce46c80fec7de17b761aeef8383452015cdf76b128d49b3568200e19739d4eb8b5532a782dd2bf5b9b0e"}, @pad1, @hao={0xc9, 0x10, @empty}, @hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0x8001, [0xffffffffffffffd0]}}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x3a, 0x8, 0x1, 0x19, 0x0, [@private0, @private0, @mcast2, @empty]}}}, @dstopts={{0x38, 0x29, 0x37, {0x32, 0x3, [], [@calipso={0x7, 0x18, {0x0, 0x4, 0x80, 0x7f, [0x5, 0x2800000000000000]}}]}}}, @rthdrdstopts={{0x18, 0x29, 0x37, {0x11}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffffffff}}, @rthdr={{0x48, 0x29, 0x39, {0x18, 0x6, 0x1, 0x6, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0={0xfc, 0x0, [], 0x1}, @local]}}}], 0x338}, 0x4000)
ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000040)=r7)
r8 = socket(0x1, 0x803, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9, 0x1, 'xfrm\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x3}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x3}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x54}}, 0x0)

[  375.680298][T16333] bond0: (slave xfrm1): ether type (65534) is different from other slaves (1), can not enslave it
03:30:32 executing program 5:
perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$loop(0x0, 0xfffffffffffffffd, 0x0)
clone(0x2112008dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast})
r2 = gettid()
tkill(r2, 0x27)
rt_sigprocmask(0x1, &(0x7f0000000040)={[0xffffffffffffffff]}, &(0x7f0000000080), 0x8)

[  375.792484][T16332] IPVS: ftp: loaded support on port[0] = 21
03:30:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x500, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x40000}, 0x1c)

03:30:32 executing program 0:
r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000180)=ANY=[@ANYBLOB="120100000c3d364064190100d42bfc92000109fa0b2c0c000000000b007b90d9c252e18e0151e5f996f393427abd2055ab17a21a8c8efede1504dc64d8cfce05c9ed686846ec8100ec7187daad7ee7a8eb17004b7b208d0360a5179aa2e2c001fea3f0849d6ca322"], 0x0)
r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x8, 0x0)
ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0xb7)
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffa)
r3 = socket(0x11, 0x800000003, 0x0)
bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
r5 = socket(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x0, 0x0, 0x5}}}}]}, 0x78}}, 0x0)
sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x5d0, 0x13, 0x8, 0x70bd2b, 0x25dfdbff, {0x25, 0x13, 0x6, 0x20, {0x4e23, 0x4e21, [0x4, 0xfffffff8, 0x5, 0x220], [0x8, 0x9, 0xe10, 0x9], r4, [0x9, 0x8]}, 0x10001, 0x2}, [@INET_DIAG_REQ_BYTECODE={0xc2, 0x1, "a42d6507aeb719a4f792507e62bb20b5ff1649f371c0f6df90371a2a8b6c9de92bf19626e3f86b04ef971d3ac2fae462490c763a67f7b5caff729410034b8fe515f174156fedd24b79d9b8be75609844732d978e3db89400bba036937120d37d7383bc7bc3eaa71cc3f0afc83d6e2e65582234545b6eb182409538e2eb3e024b1a718a51c4c89b9ab535f0f6db9575301b253bb5fe409def8daa5529af4f0273bb815ecb280e99de811ac865f7cc8e3a7ae03efe071bb4d45ed798cb5e2d"}, @INET_DIAG_REQ_BYTECODE={0x34, 0x1, "9229bc1286ea4049e4cdaf5bda54c3c503416ac04751d8d2e16b89993598b6e6990e61c44031d5776a98522a04ead018"}, @INET_DIAG_REQ_BYTECODE={0x78, 0x1, "fed6b79a1daa5550e1c9fd8acb1589c67cde5966e452395a51cb2245fbb6a4395e3734a6a40349bec72918ca8258337f8f33ae8328aa4dd9c6444231cceaebde4c7bf52afe47facf69f6ad75417094c810578ab74d6648cb3cf708cf693ff76204599e7bde21d9733145675cc73d93502b45ae62"}, @INET_DIAG_REQ_BYTECODE={0xb5, 0x1, "68872b0501f5f030097b2be58580695fbb00bac43b666b3762eb2a09e964d0aa3ee6de5522947597691fa87bcd9f85bde5c209a2ad88d59b8bf77c4d77a24b1f2696e683d5c56c7e5f49b3eb0b244c17583b72a5baa5422af9b4bed742cc01419f7cdc89281e426cd54dc274720076c86f14e076747ded4c020951a54d7b5aa40bf801470b1a00e72c1eda73ecd3d3885bde4b407c31f2370d7689769ce257966d6d18d6a30aae9a67c804032bd13b6b70"}, @INET_DIAG_REQ_BYTECODE={0xa4, 0x1, "a335384ef63cd18e08802f670306ae35171ff05c157c0d205d514ac2b81bc7c7be8e09d1240ea257e11f5de80a9402448a4b0075f293add3eaaf227461d247e16614bf31dd382367a2065d3c5874ae7ab7b24b4b330601c44fa9d48b1a9c1f30b32aeede75f2fcbad15770cbba37cf766e82f2d040fa5d7a40981131572fda52eaf802631ca9642dc2767ac2c443e31b47bc5e75efd0331e0e09cdb2a973848e"}, @INET_DIAG_REQ_BYTECODE={0x11, 0x1, "3f79a8850abeb33af3872d68fb"}, @INET_DIAG_REQ_BYTECODE={0xc9, 0x1, "0a3b1691be18151d024a7ddd99aeb575090d046d21c9a69d9c057d0c26ac4682b2a5d68262d37ff7b3ba5955532bd2daa410b3aa1814fc51657c8b53753b13e9c0297f9fc1e35493681723de57ee973eaddb15e5464eae820fbed1838ff2b82817e1f4a834db269faf711b60004d25d090f33d802d1a9e7f59abb42774ef6c556ceb7271d110e19df12f53af4ce578f530aad8189b317f160db8c27a9cff4d7f6d88b66fd704e1283bdbf6980dcc46068076be76f8e99b25de2935d8445bf2684698e05f83"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "180c36558310025129ba3334f166d6243d8fdaaa941f3eb856156f29caa9c472e08d3ce5879634d2b49f63b597251974348c779e34a840cef919a62aea199304e93d19775cace890392633b07f3dabc54b7c1f6c9b3713af"}, @INET_DIAG_REQ_BYTECODE={0x99, 0x1, "1852f5af72cb6d189828ac48cf52df4167a66479a0422b1617b56d4f5a3ff5052354cd20777cb2669cb2a8be045029e02a8b96dfcdb707538d518a62349ab08b61631ffee997c3201829ffc335c352bd8ae50734d3d581afdc33bab21f52abf5e3215009cb85d9c285c1167c80ab4966f5327f818851e94ace9f4ef43bd4b44e5bafff4b2a07cdaed48cbc1e0c1c011897f073a62d"}, @INET_DIAG_REQ_BYTECODE={0xde, 0x1, "3ec0a7292faf4d437b9c3d12c62fa37562c7d171019bc2ecc6df2105a5846424719c9948b097b45c61f67cb0f25c962c049026dc16f5f779e2518c8e5c224e6fd4cf16df86038e66314748f6a473fb05c98f14addde9d4fe47b85a106dde40bf14791ea981a1c76fb0a9e2e215f9d7f395113e21900a072229ce80d53acb419b30d678406df073b4a3f348c835d4caf061d788a8f106fc9c993e3c87ed7d2e71c1d32152745e0725459543c11457fb725409d136b5096d8acc456b4969f79b8cd3432d770d16df383206ae799162864bcfae70b7288037978b1c"}]}, 0x5d0}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$TIOCOUTQ(r6, 0x5411, &(0x7f0000000000))

[  375.938833][ T2512] usb 2-1: new high-speed USB device number 41 using dummy_hcd
03:30:32 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c00000818000100000000000000000300000000000000856fec5aa767159a0c8ad70a33bfb637e65a734073be4ce92acf758a7c3f94a602f07d5cac13c317ef6f0a6c9fad6abb7b67229ca4c57f2a1225f43aeaa8f36c3c3d0c9eddbfd9020f9bbca2412cf9e70592d8d098596ab6f37f8778d9fd0db2724dcab5993ce17ec28a3e4259b570cde248571ee710d0f16e6072e82ca7032a33629d44f13a48ce770e6961a357db6c13b1c489f8597aed2c6de4"], 0x1c}}, 0x0)

03:30:32 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0xfd, 0x80, 0x0, 0x9, 0x8920c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x101}, 0x8803, 0x80000, 0xfffffffd, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x8)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xcc)
recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0)
ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0)

[  376.147292][T16369] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[  376.319113][ T2512] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  376.335644][ T3796] usb 1-1: new high-speed USB device number 12 using dummy_hcd
[  376.388253][ T2512] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  376.412994][ T2512] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  376.438150][ T2512] usb 2-1: config 0 descriptor??
[  376.493646][ T2512] usbhid 2-1:0.0: can't add hid device: -22
[  376.503727][ T2512] usbhid: probe of 2-1:0.0 failed with error -22
[  376.693767][   T45] usb 2-1: USB disconnect, device number 41
[  376.738896][  T310] tipc: TX() has been purged, node left!
[  376.788877][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61
[  376.788896][ T3796] usb 1-1: can't read configurations, error -61
[  376.931248][  T310] tipc: TX() has been purged, node left!
[  376.948843][ T3796] usb 1-1: new high-speed USB device number 13 using dummy_hcd
03:30:33 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:33 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x600, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x50000}, 0x1c)

03:30:33 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:33 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x24, 0x3, 0x0, {0x2, 0x3, 0x0, 'syz'}}, 0x24)
syz_open_dev$loop(0x0, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  377.378935][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61
[  377.386601][ T3796] usb 1-1: can't read configurations, error -61
[  377.402600][ T3796] usb usb1-port1: attempt power cycle
03:30:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x400300}, 0x1c)

[  377.586315][T16416] IPVS: ftp: loaded support on port[0] = 21
[  377.598173][T16415] IPVS: ftp: loaded support on port[0] = 21
03:30:34 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x700, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  377.738952][   T17] usb 2-1: new high-speed USB device number 42 using dummy_hcd
03:30:34 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x900, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x1000000}, 0x1c)

[  378.149275][ T3796] usb 1-1: new high-speed USB device number 14 using dummy_hcd
[  378.159424][   T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  378.175067][   T17] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  378.189991][   T17] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  378.200954][   T17] usb 2-1: config 0 descriptor??
[  378.240277][   T17] usbhid 2-1:0.0: can't add hid device: -22
[  378.246732][   T17] usbhid: probe of 2-1:0.0 failed with error -22
[  378.418992][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61
[  378.426645][ T3796] usb 1-1: can't read configurations, error -61
[  378.447846][   T17] usb 2-1: USB disconnect, device number 42
[  378.588935][ T3796] usb 1-1: new high-speed USB device number 15 using dummy_hcd
[  378.849145][ T3796] usb 1-1: unable to read config index 0 descriptor/start: -61
[  378.856845][ T3796] usb 1-1: can't read configurations, error -61
[  378.884357][ T3796] usb usb1-port1: unable to enumerate USB device
03:30:35 executing program 0:
r0 = socket$inet6(0xa, 0x5, 0x0)
setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e24, @private=0xa010102}], 0x10)
sendto$inet6(r0, &(0x7f0000000000)="0f", 0x1, 0x20008041, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c)

03:30:35 executing program 5:
mkdir(&(0x7f0000000240)='./file1\x00', 0x0)
mkdir(&(0x7f0000000180)='./bus\x00', 0x0)
mkdir(&(0x7f0000000280)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6c6f776572646977bea0723d2e2f6275732c776f726b6469723d2e2f66696c65312c75707065726469723d2e2f66696c6530d13cb893cdae0984389636f4bfa8a6d28ac3a7d90593566a67239899c095f01d339ba50fcbf79069e43b23facec3c08ca23d792898e7f06c1f58a8fe77fb19c5dbbe32f930762dc338952e7eb07bfa153c5207efd49f5e5d2e14ce806ff91683153572a672d4118b82a2aba7eab0819c0f564bf21e6ba8c9d0be"])
getsockname$packet(0xffffffffffffffff, 0x0, 0x0)
setsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, 0x0, 0x0)
chdir(&(0x7f00000002c0)='./bus\x00')
r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x1f7)
truncate(&(0x7f0000000000)='./bus\x00', 0x9)
lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x20}, 0x16, 0x2)
r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r1, 0x0, 0x40d06)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
readlinkat(r2, &(0x7f0000000200)='./bus\x00', 0xfffffffffffffffe, 0x0)

03:30:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2000000}, 0x1c)

[  379.120074][T16509] overlayfs: unrecognized mount option "lowerdiw��r=./bus" or missing value
03:30:35 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:35 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xa00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x3000000}, 0x1c)

[  379.538985][ T9940] usb 2-1: new high-speed USB device number 43 using dummy_hcd
[  379.895877][T16509] overlayfs: unrecognized mount option "lowerdiw��r=./bus" or missing value
[  379.904778][ T9940] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  379.928584][ T9940] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  379.947051][ T9940] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  379.985476][ T9940] usb 2-1: config 0 descriptor??
[  380.049889][ T9940] usbhid 2-1:0.0: can't add hid device: -22
[  380.055933][ T9940] usbhid: probe of 2-1:0.0 failed with error -22
[  380.251629][ T9940] usb 2-1: USB disconnect, device number 43
[  380.358863][  T310] tipc: TX() has been purged, node left!
03:30:36 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:36 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xb00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:36 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x4000000}, 0x1c)

03:30:36 executing program 0:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
r2 = socket$inet6(0xa, 0x6, 0x0)
bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c)
r3 = socket$inet_dccp(0x2, 0x6, 0x0)
listen(r2, 0x6)
setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1)
connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10)
r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
sendfile(r3, r4, 0x0, 0x100000edc3)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000480)={0x3, 0x1})
r5 = socket$packet(0x11, 0x3, 0x300)
r6 = dup2(r5, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
r7 = socket$packet(0x11, 0x3, 0x300)
r8 = dup2(r7, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
ioctl$PPPIOCSPASS(r8, 0x40107447, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x109, 0x0, 0x0, 0x42}, {0x3, 0x1, 0x5, 0x4}, {0x5, 0xfd, 0x4, 0xfffffffc}, {0x5, 0xb, 0x9, 0x105}, {0x404, 0x2, 0x0, 0x1}, {0x5, 0x1, 0x81, 0x17}, {0x6, 0x6, 0x81, 0x14000}, {0x0, 0xff, 0x3, 0x1000}]})

03:30:36 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
pipe(&(0x7f0000000140)={<r3=>0xffffffffffffffff})
r4 = socket$nl_route(0x10, 0x3, 0x0)
splice(r3, 0x0, r4, 0x0, 0x1420000a7a, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1c, 0xe, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYRES16=r4], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x4, 0x4}, 0x10}, 0x2b)
syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0)

03:30:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xc00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x5000000}, 0x1c)

03:30:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x6000000}, 0x1c)

03:30:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xd00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  380.793151][T16552] IPVS: ftp: loaded support on port[0] = 21
03:30:37 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x7000000}, 0x1c)

03:30:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xe00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:37 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x8000000}, 0x1c)

03:30:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf00, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  381.379092][ T9942] usb 2-1: new high-speed USB device number 44 using dummy_hcd
03:30:38 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r1, 0x8983, &(0x7f00000002c0)={0x1, 'veth0_vlan\x00', {}, 0x6})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611)
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x20000000fb], 0x100000, 0x200400})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c, 0x80800)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000300)="58044ecc5da4545696d47857c9644e79", 0x10)
setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000280)=0x5, 0x4)

03:30:38 executing program 5:
r0 = socket$inet6(0xa, 0x3, 0x3c)
connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c)
sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000051c0)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)="01ea", 0x2}], 0x1, 0x0, 0x30}}], 0x1, 0x0)
io_setup(0x3b24, &(0x7f0000000740)=<r1=>0x0)
io_submit(r1, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x982f00000000b819, 0x2000, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4009}])
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = dup2(r2, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, &(0x7f0000000000))

03:30:38 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x1100, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x9000000}, 0x1c)

[  381.717031][T16625] IPVS: ftp: loaded support on port[0] = 21
03:30:38 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x1200, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  381.809119][ T9942] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
03:30:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xa000000}, 0x1c)

[  381.856187][ T9942] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[  381.933452][ T9942] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  381.978698][ T9942] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  382.031302][ T9942] usb 2-1: config 0 descriptor??
[  382.401962][ T9942] usbhid 2-1:0.0: can't add hid device: -71
[  382.408027][ T9942] usbhid: probe of 2-1:0.0 failed with error -71
[  382.436990][ T9942] usb 2-1: USB disconnect, device number 44
03:30:39 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:39 executing program 5:
unshare(0x40000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x14032, 0xffffffffffffffff, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246)
ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, &(0x7f00000000c0))

03:30:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf000000}, 0x1c)

03:30:39 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x2500, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:39 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:39 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  383.121997][T16705] IPVS: ftp: loaded support on port[0] = 21
[  383.135172][T16706] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x12903da4}, 0x1c)

03:30:39 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x3901, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  383.379205][   T27] audit: type=1804 audit(1593747039.881:50): pid=16722 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/175/file0/bus" dev="loop0" ino=43 res=1
[  383.394272][   T45] usb 2-1: new high-speed USB device number 45 using dummy_hcd
[  383.416635][T16704] IPVS: ftp: loaded support on port[0] = 21
03:30:40 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  383.508251][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  383.573490][T16705] IPVS: ftp: loaded support on port[0] = 21
[  383.717897][   T27] audit: type=1804 audit(1593747040.221:51): pid=16747 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/176/bus" dev="sda1" ino=16371 res=1
03:30:40 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4788, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  383.879268][   T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  383.915778][   T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[  383.953159][   T27] audit: type=1804 audit(1593747040.461:52): pid=16772 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/177/bus" dev="sda1" ino=16367 res=1
[  383.954576][   T45] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  384.011230][   T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  384.029392][   T45] usb 2-1: config 0 descriptor??
[  384.067425][  T310] tipc: TX() has been purged, node left!
[  384.090192][  T310] tipc: TX() has been purged, node left!
[  384.370255][   T45] usbhid 2-1:0.0: can't add hid device: -71
[  384.376421][   T45] usbhid: probe of 2-1:0.0 failed with error -71
[  384.398254][   T45] usb 2-1: USB disconnect, device number 45
03:30:41 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x1}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

[  385.288808][   T17] usb 2-1: new high-speed USB device number 46 using dummy_hcd
[  385.709156][   T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  385.728767][   T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0
[  385.738542][   T17] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  385.768817][   T17] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  385.793078][   T17] usb 2-1: config 0 descriptor??
03:30:42 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:42 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:42 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4888, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:42 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x18020000}, 0x1c)

03:30:42 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  386.008176][T16841] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  386.138839][   T17] usbhid 2-1:0.0: can't add hid device: -71
[  386.145049][   T17] usbhid: probe of 2-1:0.0 failed with error -71
[  386.188670][   T17] usb 2-1: USB disconnect, device number 46
03:30:42 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x5865, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  386.245351][   T27] audit: type=1804 audit(1593747042.751:53): pid=16854 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/178/file0/bus" dev="loop0" ino=45 res=1
03:30:42 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})

[  386.425977][T16842] IPVS: ftp: loaded support on port[0] = 21
[  386.432738][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:43 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  386.532287][T16853] IPVS: ftp: loaded support on port[0] = 21
[  386.746654][   T27] audit: type=1804 audit(1593747043.251:54): pid=16867 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/179/bus" dev="sda1" ino=16376 res=1
03:30:43 executing program 1:
r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0)
syz_usb_disconnect(r0)

03:30:43 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6558, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:43 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})

03:30:43 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x20000000}, 0x1c)

[  387.013045][T16906] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  387.132211][   T27] audit: type=1804 audit(1593747043.641:55): pid=16906 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/180/file0/bus" dev="loop0" ino=46 res=1
03:30:43 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  387.179458][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  387.228904][ T9942] usb 2-1: new high-speed USB device number 47 using dummy_hcd
[  387.414861][T16941] IPVS: ftp: loaded support on port[0] = 21
[  387.480087][  T310] tipc: TX() has been purged, node left!
[  387.515865][  T310] tipc: TX() has been purged, node left!
[  387.570777][  T310] tipc: TX() has been purged, node left!
[  387.603866][ T9942] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  387.615415][ T9942] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  387.635149][ T9942] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  387.651209][ T9942] usb 2-1: config 0 descriptor??
[  387.999978][ T9942] usbhid 2-1:0.0: can't add hid device: -71
[  388.008317][ T9942] usbhid: probe of 2-1:0.0 failed with error -71
[  388.038971][ T9942] usb 2-1: USB disconnect, device number 47
03:30:45 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:45 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8100, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:45 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})

03:30:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x2d502a37}, 0x1c)

03:30:45 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:45 executing program 1:
syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0)
syz_usb_disconnect(0xffffffffffffffff)

[  389.334573][T17010] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:45 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:46 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8847, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  389.439925][   T27] audit: type=1804 audit(1593747045.951:56): pid=17010 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/181/file0/bus" dev="loop0" ino=47 res=1
03:30:46 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:46 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  389.557254][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  389.598943][   T45] usb 2-1: new high-speed USB device number 48 using dummy_hcd
[  389.606001][T17006] IPVS: ftp: loaded support on port[0] = 21
03:30:46 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:46 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8848, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  389.726116][   T27] audit: type=1804 audit(1593747046.231:57): pid=17026 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/182/bus" dev="sda1" ino=16370 res=1
03:30:46 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:46 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:46 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  390.004777][   T27] audit: type=1804 audit(1593747046.511:58): pid=17041 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/183/bus" dev="sda1" ino=16372 res=1
[  390.028870][   T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  390.084107][   T45] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
03:30:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x372a502d}, 0x1c)

[  390.126476][   T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  390.150670][   T45] usb 2-1: config 0 descriptor??
03:30:46 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  390.515402][T17078] IPVS: ftp: loaded support on port[0] = 21
[  390.679116][   T45] usbhid 2-1:0.0: can't add hid device: -71
[  390.687540][   T45] usbhid: probe of 2-1:0.0 failed with error -71
[  390.707583][   T45] usb 2-1: USB disconnect, device number 48
03:30:47 executing program 1:
syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0)
syz_usb_disconnect(0xffffffffffffffff)

03:30:47 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfeff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:47 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:47 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:47 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  391.068873][  T310] tipc: TX() has been purged, node left!
[  391.144940][T17120] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x40000000}, 0x1c)

[  391.179413][   T27] audit: type=1804 audit(1593747047.691:59): pid=17120 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/184/file0/bus" dev="loop0" ino=48 res=1
03:30:47 executing program 2:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  391.249206][  T310] tipc: TX() has been purged, node left!
03:30:47 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xff0f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:47 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  391.408887][  T310] tipc: TX() has been purged, node left!
[  391.435980][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
[  391.460031][   T45] usb 2-1: new high-speed USB device number 49 using dummy_hcd
03:30:48 executing program 2:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  391.512902][T17123] IPVS: ftp: loaded support on port[0] = 21
03:30:48 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfffe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  391.582637][T17140] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  391.627953][   T27] audit: type=1804 audit(1593747048.131:60): pid=17140 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/185/file0/bus" dev="loop0" ino=49 res=1
03:30:48 executing program 2:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  391.849193][   T45] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  391.862289][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
[  391.891303][   T45] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  391.912258][   T45] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  391.955336][   T45] usb 2-1: config 0 descriptor??
[  392.498967][   T45] usbhid 2-1:0.0: can't add hid device: -71
[  392.505144][   T45] usbhid: probe of 2-1:0.0 failed with error -71
[  392.527593][   T45] usb 2-1: USB disconnect, device number 49
03:30:49 executing program 1:
syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d34, 0xa, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x10}}}}}]}}]}}, 0x0)
syz_usb_disconnect(0xffffffffffffffff)

03:30:49 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:49 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:49 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x34000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:49 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x41020000}, 0x1c)

03:30:49 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  393.004373][T17204] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:49 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:49 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x400300, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  393.211844][   T27] audit: type=1804 audit(1593747049.721:61): pid=17204 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/186/file0/bus" dev="loop0" ino=50 res=1
[  393.279300][ T2512] usb 2-1: new high-speed USB device number 50 using dummy_hcd
[  393.318151][T17202] IPVS: ftp: loaded support on port[0] = 21
03:30:49 executing program 2:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:50 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x1000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:50 executing program 2:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  393.669605][ T2512] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  393.702758][ T2512] usb 2-1: New USB device found, idVendor=1d34, idProduct=000a, bcdDevice= 0.40
[  393.754920][ T2512] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[  393.799926][ T2512] usb 2-1: config 0 descriptor??
[  393.867611][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
[  394.348996][ T2512] usbhid 2-1:0.0: can't add hid device: -71
[  394.355327][ T2512] usbhid: probe of 2-1:0.0 failed with error -71
[  394.375041][ T2512] usb 2-1: USB disconnect, device number 50
03:30:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x54000000}, 0x1c)

03:30:51 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x2000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:51 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:51 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:51 executing program 2:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:51 executing program 1:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  394.748874][  T310] tipc: TX() has been purged, node left!
03:30:51 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

[  394.830854][T17283] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  394.918569][   T27] audit: type=1804 audit(1593747051.421:62): pid=17283 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/187/file0/bus" dev="loop0" ino=51 res=1
03:30:51 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

[  394.960308][  T310] tipc: TX() has been purged, node left!
[  394.995934][T17283] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625)
[  395.023340][   T27] audit: type=1804 audit(1593747051.531:63): pid=17297 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/179/bus" dev="sda1" ino=16066 res=1
03:30:51 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:51 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x3000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  395.074454][T17288] IPVS: ftp: loaded support on port[0] = 21
[  395.100363][T17283] FAT-fs (loop0): Filesystem has been set read-only
03:30:51 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

[  395.145414][T17283] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 625)
03:30:51 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  395.259074][T17283] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 625)
[  395.415065][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x58000000}, 0x1c)

03:30:52 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:52 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x4000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  395.908070][T17343] IPVS: ftp: loaded support on port[0] = 21
03:30:54 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:54 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:54 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:54 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x5000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:54 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:54 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x8dffffff}, 0x1c)

03:30:54 executing program 1:
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  397.778900][  T310] tipc: TX() has been purged, node left!
[  397.795114][T17407] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:54 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x6000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  397.851773][   T27] audit: type=1804 audit(1593747054.361:64): pid=17407 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/188/file0/bus" dev="loop0" ino=52 res=1
03:30:54 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:54 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  398.004534][T17407] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625)
03:30:54 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:54 executing program 1:
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  398.046944][T17403] IPVS: ftp: loaded support on port[0] = 21
[  398.063346][T17407] FAT-fs (loop0): Filesystem has been set read-only
03:30:54 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x7000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  398.110924][T17407] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF
[  398.186829][T17407] FAT-fs (loop0): error, clusters badly computed (1 != 94)
[  398.232085][T17407] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 625)
03:30:54 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:54 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:54 executing program 1:
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  398.330382][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  398.484843][T17440] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  398.556207][   T27] audit: type=1804 audit(1593747055.061:65): pid=17440 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/189/file0/bus" dev="loop0" ino=53 res=1
03:30:55 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:55 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x8000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:55 executing program 1:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:55 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:55 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x91ffffff}, 0x1c)

03:30:55 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  398.833231][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
03:30:55 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:55 executing program 1:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:55 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x9000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:55 executing program 5:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:55 executing program 1:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  399.071982][T17476] IPVS: ftp: loaded support on port[0] = 21
[  399.096199][T17488] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:55 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xa000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  399.264690][   T27] audit: type=1804 audit(1593747055.771:66): pid=17488 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/190/file0/bus" dev="loop0" ino=54 res=1
[  399.756811][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
03:30:56 executing program 2:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:56 executing program 5:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:56 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:56 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xb000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:56 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xa43d9012}, 0x1c)

03:30:56 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:56 executing program 5:
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:56 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  399.968078][T17539] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  399.984778][T17541] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:56 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xc000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:56 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  400.103511][   T27] audit: type=1804 audit(1593747056.611:67): pid=17541 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir016283250/syzkaller.wuGozi/172/file0/bus" dev="loop2" ino=56 res=1
03:30:56 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  400.273639][   T27] audit: type=1804 audit(1593747056.611:68): pid=17539 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/191/file0/bus" dev="loop0" ino=55 res=1
03:30:56 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:57 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xd000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:57 executing program 1:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:57 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  400.595778][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
[  400.642084][  T289] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
[  400.754046][T17569] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:57 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xb8040000}, 0x1c)

03:30:57 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:57 executing program 1:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:57 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xe000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  400.846168][   T27] audit: type=1804 audit(1593747057.351:69): pid=17577 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/192/file0/bus" dev="loop0" ino=57 res=1
03:30:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  400.945646][T17577] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625)
03:30:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:57 executing program 5:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:57 executing program 1:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  401.018060][T17577] FAT-fs (loop0): Filesystem has been set read-only
[  401.049418][T17577] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF
03:30:57 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  401.094884][T17577] FAT-fs (loop0): error, clusters badly computed (1 != 108)
[  401.108914][T17577] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 625)
03:30:57 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  401.191418][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  401.368108][T17608] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  401.421760][   T27] audit: type=1804 audit(1593747057.931:70): pid=17608 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/193/file0/bus" dev="loop0" ino=58 res=1
[  401.669891][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
03:30:58 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xc4ff0000}, 0x1c)

03:30:58 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:58 executing program 5:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:30:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:30:58 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x10000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:30:58 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb)

03:30:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:30:58 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:58 executing program 5:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  401.896929][T17626] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:30:58 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:30:58 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x11000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  402.139903][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  402.628872][  T310] tipc: TX() has been purged, node left!
03:30:59 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xc4ffffff}, 0x1c)

03:30:59 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb)

03:30:59 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:30:59 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:30:59 executing program 1:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:30:59 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x12000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  402.788876][  T310] tipc: TX() has been purged, node left!
03:30:59 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:30:59 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  402.841913][T17662] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:59 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb)

03:30:59 executing program 5:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  402.924516][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:30:59 executing program 1:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  402.969274][   T27] audit: type=1804 audit(1593747059.471:71): pid=17667 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/198/bus" dev="sda1" ino=16371 res=1
03:30:59 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x25000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  403.094249][T17678] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  403.171454][T17683] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  403.186297][   T27] audit: type=1804 audit(1593747059.691:72): pid=17678 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972708442/syzkaller.HqV8uk/211/file0/bus" dev="loop5" ino=61 res=1
[  403.286198][   T27] audit: type=1804 audit(1593747059.791:73): pid=17681 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/199/bus" dev="sda1" ino=16382 res=1
[  403.329471][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  403.539241][T11021] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
03:31:00 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe02e0000}, 0x1c)

03:31:00 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:00 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x39010000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:00 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

03:31:00 executing program 1:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:00 executing program 5:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:00 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  403.820258][T17708] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  403.849059][T17710] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:00 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x40000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  403.939517][   T27] audit: type=1804 audit(1593747060.451:74): pid=17709 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir232848933/syzkaller.u89Ch8/200/bus" dev="sda1" ino=16371 res=1
03:31:00 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

03:31:00 executing program 1:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:00 executing program 5:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  404.076331][   T27] audit: type=1804 audit(1593747060.491:75): pid=17720 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/197/file0/bus" dev="sda1" ino=16368 res=1
03:31:00 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  404.167568][   T27] audit: type=1804 audit(1593747060.501:76): pid=17710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/197/file0/bus" dev="sda1" ino=16368 res=1
[  404.234428][T17731] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  404.477500][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  404.616171][T17737] IPVS: ftp: loaded support on port[0] = 21
03:31:01 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe0ffffff}, 0x1c)

03:31:01 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x60000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:01 executing program 1:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:01 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:01 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

03:31:01 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:01 executing program 1:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:01 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x65580000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:01 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:01 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:01 executing program 5:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})

03:31:01 executing program 1:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  405.272995][T17793] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  405.326588][   T27] kauditd_printk_skb: 4 callbacks suppressed
[  405.326598][   T27] audit: type=1804 audit(1593747061.831:81): pid=17793 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/200/file0/bus" dev="loop0" ino=65 res=1
[  405.416855][T17793] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 625)
[  405.426954][T17793] FAT-fs (loop0): Filesystem has been set read-only
[  405.440432][T17793] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 625)
[  405.450449][T17802] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  405.499402][ T6814] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  405.566674][   T27] audit: type=1804 audit(1593747062.071:82): pid=17802 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972708442/syzkaller.HqV8uk/214/file0/bus" dev="loop5" ino=66 res=1
[  405.660900][    T7] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:02 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xe8030000}, 0x1c)

03:31:02 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x81000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:02 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:02 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:02 executing program 1:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:02 executing program 5:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:02 executing program 1:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
add_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="240000000009360700000008000640000000000800de619691d7264200a92cdd7f2449a213e692ffa201496b299b0a75f53d08acfd537d7ef082c79369a2d54813c7a819bd8820a3cbfca9763e0fcf5d9d4a184623288499eb857de6d6b168043f651a9f53ec0b245d23f62551b36be676c988c1133df73d6149d093b569df481059c54d09ce54c54f70a67347eadc57a1663ef6a166174881974188910f67a5a45302f3a8"], 0x24}}, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:02 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  405.977628][T17823] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  405.979435][T17821] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:02 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x88470000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  406.106182][   T27] audit: type=1804 audit(1593747062.611:83): pid=17823 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972708442/syzkaller.HqV8uk/215/file0/bus" dev="loop5" ino=67 res=1
03:31:02 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  406.276521][   T27] audit: type=1804 audit(1593747062.671:84): pid=17821 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/201/file0/bus" dev="sda1" ino=16382 res=1
03:31:02 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x88480000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:02 executing program 2:
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  406.530997][T17835] IPVS: ftp: loaded support on port[0] = 21
[  406.703707][T11013] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1)
03:31:03 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf4010000}, 0x1c)

03:31:03 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x88a8ffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:03 executing program 2:
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:03 executing program 5 (fault-call:1 fault-nth:0):
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:03 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  406.973159][T17865] FAULT_INJECTION: forcing a failure.
[  406.973159][T17865] name failslab, interval 1, probability 0, space 0, times 0
[  407.043385][T17865] CPU: 0 PID: 17865 Comm: syz-executor.5 Not tainted 5.8.0-rc3-syzkaller #0
[  407.052084][T17865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  407.062134][T17865] Call Trace:
[  407.065427][T17865]  dump_stack+0x1f0/0x31e
[  407.069770][T17865]  should_fail+0x38a/0x4e0
[  407.074194][T17865]  ? tomoyo_realpath_from_path+0xd8/0x630
[  407.079907][T17865]  should_failslab+0x5/0x20
[  407.084406][T17865]  __kmalloc+0x74/0x330
[  407.088565][T17865]  ? tomoyo_realpath_from_path+0xcb/0x630
[  407.094284][T17865]  tomoyo_realpath_from_path+0xd8/0x630
[  407.099837][T17865]  tomoyo_path_number_perm+0x18f/0x690
[  407.105330][T17865]  security_file_ioctl+0x55/0xb0
[  407.110271][T17865]  __se_sys_ioctl+0x48/0x160
[  407.114887][T17865]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  407.120960][T17865]  do_syscall_64+0x73/0xe0
[  407.125380][T17865]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  407.131272][T17865] RIP: 0033:0x45cb29
[  407.135154][T17865] Code: Bad RIP value.
03:31:03 executing program 2:
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000002c0))
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  407.139212][T17865] RSP: 002b:00007f402cb0cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  407.147617][T17865] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  407.155605][T17865] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003
[  407.163594][T17865] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  407.171558][T17865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  407.179523][T17865] R13: 0000000000000233 R14: 00000000004c48be R15: 00007f402cb0d6d4
[  407.190828][T17865] ERROR: Out of memory at tomoyo_realpath_from_path.
[  407.226899][   T27] audit: type=1804 audit(1593747063.731:85): pid=17868 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/202/bus" dev="sda1" ino=16382 res=1
03:31:03 executing program 1 (fault-call:1 fault-nth:0):
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:03 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:03 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

03:31:03 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x9effffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:03 executing program 5 (fault-call:1 fault-nth:1):
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  407.420497][T17898] FAULT_INJECTION: forcing a failure.
[  407.420497][T17898] name failslab, interval 1, probability 0, space 0, times 0
[  407.449713][T17899] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  407.509414][   T27] audit: type=1804 audit(1593747064.021:86): pid=17899 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/203/file0/bus" dev="loop0" ino=68 res=1
[  407.562564][T17898] CPU: 1 PID: 17898 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0
[  407.571256][T17898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  407.581304][T17898] Call Trace:
[  407.584595][T17898]  dump_stack+0x1f0/0x31e
[  407.588928][T17898]  should_fail+0x38a/0x4e0
[  407.593346][T17898]  ? tomoyo_realpath_from_path+0xd8/0x630
[  407.599058][T17898]  should_failslab+0x5/0x20
[  407.603567][T17898]  __kmalloc+0x74/0x330
[  407.607724][T17898]  ? tomoyo_realpath_from_path+0xcb/0x630
[  407.613447][T17898]  tomoyo_realpath_from_path+0xd8/0x630
[  407.619005][T17898]  tomoyo_path_number_perm+0x18f/0x690
[  407.624500][T17898]  security_file_ioctl+0x55/0xb0
[  407.629441][T17898]  __se_sys_ioctl+0x48/0x160
[  407.634037][T17898]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  407.640112][T17898]  do_syscall_64+0x73/0xe0
[  407.644527][T17898]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  407.650412][T17898] RIP: 0033:0x45cb29
[  407.654296][T17898] Code: Bad RIP value.
03:31:04 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

[  407.658358][T17898] RSP: 002b:00007fdeebc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  407.666763][T17898] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  407.674729][T17898] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003
[  407.682700][T17898] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  407.690668][T17898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  407.698638][T17898] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fdeebc626d4
[  407.738623][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  407.746809][T17898] ERROR: Out of memory at tomoyo_realpath_from_path.
[  407.840839][T17914] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:04 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xf5ffffff}, 0x1c)

03:31:04 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:04 executing program 1 (fault-call:1 fault-nth:1):
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:04 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xefffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  407.907692][   T27] audit: type=1804 audit(1593747064.411:87): pid=17914 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/204/file0/bus" dev="loop0" ino=69 res=1
03:31:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x2, &(0x7f0000000140))

[  407.992537][T17923] FAULT_INJECTION: forcing a failure.
[  407.992537][T17923] name failslab, interval 1, probability 0, space 0, times 0
[  408.022669][T17923] CPU: 0 PID: 17923 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0
[  408.031348][T17923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  408.041396][T17923] Call Trace:
[  408.044692][T17923]  dump_stack+0x1f0/0x31e
[  408.049026][T17923]  should_fail+0x38a/0x4e0
[  408.053453][T17923]  ? tomoyo_encode2+0x25a/0x560
[  408.058304][T17923]  should_failslab+0x5/0x20
[  408.062805][T17923]  __kmalloc+0x74/0x330
[  408.066965][T17923]  tomoyo_encode2+0x25a/0x560
[  408.071648][T17923]  tomoyo_realpath_from_path+0x5d6/0x630
[  408.077290][T17923]  tomoyo_path_number_perm+0x18f/0x690
[  408.082784][T17923]  security_file_ioctl+0x55/0xb0
[  408.087725][T17923]  __se_sys_ioctl+0x48/0x160
[  408.092318][T17923]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  408.098384][T17923]  do_syscall_64+0x73/0xe0
[  408.102803][T17923]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  408.108692][T17923] RIP: 0033:0x45cb29
[  408.112575][T17923] Code: Bad RIP value.
[  408.116645][T17923] RSP: 002b:00007fdeebc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  408.125057][T17923] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  408.133027][T17923] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003
03:31:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x10, &(0x7f0000000140))

03:31:04 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
lseek(r1, 0x4200, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

[  408.140996][T17923] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  408.148964][T17923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  408.156936][T17923] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fdeebc626d4
[  408.195374][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:04 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x301, &(0x7f0000000140))

03:31:04 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xf0ffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:04 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  408.306819][   T27] audit: type=1804 audit(1593747064.811:88): pid=17940 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/205/bus" dev="sda1" ino=15753 res=1
[  408.376712][T17923] ERROR: Out of memory at tomoyo_realpath_from_path.
[  408.378963][  T310] tipc: TX() has been purged, node left!
[  408.457341][T17949] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  408.518932][   T27] audit: type=1804 audit(1593747065.021:89): pid=17949 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/206/file0/bus" dev="loop0" ino=70 res=1
[  408.560427][  T310] tipc: TX() has been purged, node left!
[  408.583894][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:05 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfc000000}, 0x1c)

03:31:05 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125d, &(0x7f0000000140))

03:31:05 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfeff0000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:05 executing program 1 (fault-call:1 fault-nth:2):
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:05 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  408.968026][T17968] FAULT_INJECTION: forcing a failure.
[  408.968026][T17968] name failslab, interval 1, probability 0, space 0, times 0
[  409.008800][T17968] CPU: 0 PID: 17968 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0
[  409.017496][T17968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  409.027545][T17968] Call Trace:
[  409.030836][T17968]  dump_stack+0x1f0/0x31e
[  409.035167][T17968]  should_fail+0x38a/0x4e0
[  409.039589][T17968]  ? tomoyo_encode2+0x25a/0x560
[  409.044434][T17968]  should_failslab+0x5/0x20
[  409.048942][T17968]  __kmalloc+0x74/0x330
[  409.053126][T17968]  tomoyo_encode2+0x25a/0x560
[  409.057812][T17968]  tomoyo_realpath_from_path+0x5d6/0x630
[  409.063467][T17968]  tomoyo_path_number_perm+0x18f/0x690
[  409.068961][T17968]  security_file_ioctl+0x55/0xb0
[  409.073902][T17968]  __se_sys_ioctl+0x48/0x160
[  409.078525][T17968]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  409.084592][T17968]  do_syscall_64+0x73/0xe0
[  409.089013][T17968]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  409.094903][T17968] RIP: 0033:0x45cb29
[  409.098783][T17968] Code: Bad RIP value.
03:31:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125e, &(0x7f0000000140))

03:31:05 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  409.102838][T17968] RSP: 002b:00007fdeebc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  409.111242][T17968] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  409.119215][T17968] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000003
[  409.127205][T17968] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  409.135163][T17968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[  409.143132][T17968] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fdeebc626d4
03:31:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125f, &(0x7f0000000140))

[  409.167786][T17976] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1260, &(0x7f0000000140))

03:31:05 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140))

[  409.313217][   T27] audit: type=1804 audit(1593747065.821:90): pid=17976 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/207/file0/bus" dev="sda1" ino=16372 res=1
[  409.441071][T17968] ERROR: Out of memory at tomoyo_realpath_from_path.
03:31:06 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfe800000}, 0x1c)

03:31:06 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xff0f0000, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:06 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:06 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:06 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1262, &(0x7f0000000140))

03:31:06 executing program 1 (fault-call:1 fault-nth:3):
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x2, &(0x7f0000000140))

[  410.044144][T18014] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x10, &(0x7f0000000140))

03:31:06 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:06 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1263, &(0x7f0000000140))

03:31:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x301, &(0x7f0000000140))

[  410.291463][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:07 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfe80ffff}, 0x1c)

03:31:07 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1264, &(0x7f0000000140))

03:31:07 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffa888, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:07 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125d, &(0x7f0000000140))

03:31:07 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb)

03:31:07 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:07 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:07 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1265, &(0x7f0000000140))

03:31:07 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125e, &(0x7f0000000140))

03:31:07 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  410.989774][T18051] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  411.115905][   T27] kauditd_printk_skb: 1 callbacks suppressed
[  411.115915][   T27] audit: type=1804 audit(1593747067.621:92): pid=18051 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/209/file0/bus" dev="loop0" ino=72 res=1
03:31:07 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffff7f, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:07 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1267, &(0x7f0000000140))

[  411.282111][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:08 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfec0ffff}, 0x1c)

03:31:08 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125f, &(0x7f0000000140))

03:31:08 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:08 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb)

03:31:08 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1268, &(0x7f0000000140))

03:31:08 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffff9e, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:08 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:08 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1260, &(0x7f0000000140))

03:31:08 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1269, &(0x7f0000000140))

[  411.983530][T18097] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:08 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140))

03:31:08 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xffffffef, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:08 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1274, &(0x7f0000000140))

[  412.090556][   T27] audit: type=1804 audit(1593747068.601:93): pid=18097 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/210/file0/bus" dev="loop0" ino=73 res=1
[  412.191294][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:09 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff000000}, 0x1c)

03:31:09 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb)

03:31:09 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:09 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1262, &(0x7f0000000140))

03:31:09 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0xfffffff0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:09 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1275, &(0x7f0000000140))

03:31:09 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:09 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1276, &(0x7f0000000140))

03:31:09 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1263, &(0x7f0000000140))

[  412.967914][T18138] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:09 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1264, &(0x7f0000000140))

03:31:09 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:09 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1277, &(0x7f0000000140))

[  413.127633][   T27] audit: type=1804 audit(1593747069.621:94): pid=18138 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/211/file0/bus" dev="loop0" ino=74 res=1
[  413.208820][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:10 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xff0f0000}, 0x1c)

03:31:10 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:10 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1265, &(0x7f0000000140))

03:31:10 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:10 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:10 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1278, &(0x7f0000000140))

03:31:10 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  413.874092][T18177] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:10 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:10 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(0x0, 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:10 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1279, &(0x7f0000000140))

03:31:10 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1267, &(0x7f0000000140))

[  413.920204][   T27] audit: type=1804 audit(1593747070.431:95): pid=18177 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/212/file0/bus" dev="loop0" ino=75 res=1
[  413.948921][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:10 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  414.139324][T18197] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  414.188322][   T27] audit: type=1804 audit(1593747070.691:96): pid=18197 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/213/file0/bus" dev="loop0" ino=76 res=1
[  414.212885][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:11 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffff0000}, 0x1c)

03:31:11 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127a, &(0x7f0000000140))

03:31:11 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1268, &(0x7f0000000140))

03:31:11 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:11 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:11 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:11 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1269, &(0x7f0000000140))

[  414.817848][T18222] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:11 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1274, &(0x7f0000000140))

03:31:11 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127b, &(0x7f0000000140))

03:31:11 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:11 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:11 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1275, &(0x7f0000000140))

[  414.922204][   T27] audit: type=1804 audit(1593747071.431:97): pid=18232 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/214/file0/bus" dev="loop0" ino=77 res=1
[  415.030770][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:12 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffff80fe}, 0x1c)

03:31:12 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127c, &(0x7f0000000140))

03:31:12 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:12 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:12 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1276, &(0x7f0000000140))

03:31:12 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:12 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:31:12 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127e, &(0x7f0000000140))

03:31:12 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1277, &(0x7f0000000140))

[  415.786675][T18266] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:12 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:12 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127f, &(0x7f0000000140))

03:31:12 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

[  415.908427][   T27] audit: type=1804 audit(1593747072.411:98): pid=18266 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/215/file0/bus" dev="loop0" ino=78 res=1
[  416.017167][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffc0fe}, 0x1c)

03:31:13 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x3b71, &(0x7f0000000140))

03:31:13 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:13 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1278, &(0x7f0000000140))

03:31:13 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:13 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:31:13 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c00, &(0x7f0000000140))

[  416.701377][T18304] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:13 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:31:13 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1279, &(0x7f0000000140))

03:31:13 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c01, &(0x7f0000000140))

03:31:13 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127a, &(0x7f0000000140))

[  416.815992][   T27] audit: type=1804 audit(1593747073.321:99): pid=18304 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/216/file0/bus" dev="loop0" ino=79 res=1
03:31:13 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  416.930601][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffff8d}, 0x1c)

03:31:14 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:31:14 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127b, &(0x7f0000000140))

03:31:14 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x541b, &(0x7f0000000140))

03:31:14 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:14 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:31:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5421, &(0x7f0000000140))

03:31:14 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127c, &(0x7f0000000140))

03:31:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5450, &(0x7f0000000140))

[  417.705668][T18345] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:14 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5451, &(0x7f0000000140))

[  417.842517][   T27] audit: type=1804 audit(1593747074.351:100): pid=18345 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/217/file0/bus" dev="loop0" ino=80 res=1
[  417.946257][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffff91}, 0x1c)

03:31:15 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127e, &(0x7f0000000140))

03:31:15 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:31:15 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:15 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:15 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5452, &(0x7f0000000140))

03:31:15 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, 0x0)

03:31:15 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5460, &(0x7f0000000140))

[  418.677459][T18387] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:15 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x6364, &(0x7f0000000140))

03:31:15 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127f, &(0x7f0000000140))

03:31:15 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  418.789482][   T27] audit: type=1804 audit(1593747075.291:101): pid=18387 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/218/file0/bus" dev="loop0" ino=81 res=1
03:31:15 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140))

[  418.890206][T11013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffc4}, 0x1c)

03:31:16 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4143, &(0x7f0000000140))

03:31:16 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:16 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8912, &(0x7f0000000140))

03:31:16 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:16 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:16 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c00, &(0x7f0000000140))

03:31:16 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8933, &(0x7f0000000140))

03:31:16 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  419.659910][T18431] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:16 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  419.797436][   T27] audit: type=1804 audit(1593747076.301:102): pid=18431 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/219/file0/bus" dev="sda1" ino=16374 res=1
03:31:16 executing program 2:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:16 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  419.968547][T18455] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  420.022114][T18460] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  420.037896][   T27] audit: type=1804 audit(1593747076.541:103): pid=18455 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir016283250/syzkaller.wuGozi/226/file0/bus" dev="loop2" ino=82 res=1
[  420.075309][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  420.082437][   T27] audit: type=1804 audit(1593747076.541:104): pid=18460 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/220/file0/bus" dev="loop0" ino=83 res=1
[  420.124753][  T310] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xffffffe0}, 0x1c)

03:31:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c01, &(0x7f0000000140))

03:31:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x400454ca, &(0x7f0000000140))

03:31:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:17 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

03:31:17 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140))

03:31:17 executing program 2 (fault-call:5 fault-nth:0):
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x541b, &(0x7f0000000140))

03:31:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40049409, &(0x7f0000000140))

[  420.591981][T18482] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  420.735900][   T27] audit: type=1804 audit(1593747077.241:105): pid=18493 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/221/bus" dev="sda1" ino=16367 res=1
[  420.755588][T18491] FAULT_INJECTION: forcing a failure.
[  420.755588][T18491] name failslab, interval 1, probability 0, space 0, times 0
03:31:17 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

[  420.865302][T18491] CPU: 0 PID: 18491 Comm: syz-executor.2 Not tainted 5.8.0-rc3-syzkaller #0
[  420.874018][T18491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  420.884092][T18491] Call Trace:
[  420.887398][T18491]  dump_stack+0x1f0/0x31e
[  420.891754][T18491]  should_fail+0x38a/0x4e0
[  420.896197][T18491]  ? tomoyo_realpath_from_path+0xd8/0x630
[  420.901930][T18491]  should_failslab+0x5/0x20
[  420.906450][T18491]  __kmalloc+0x74/0x330
[  420.910745][T18491]  ? tomoyo_realpath_from_path+0xcb/0x630
[  420.916485][T18491]  tomoyo_realpath_from_path+0xd8/0x630
[  420.922055][T18491]  tomoyo_path_number_perm+0x18f/0x690
[  420.927560][T18491]  security_file_ioctl+0x55/0xb0
[  420.932600][T18491]  __se_sys_ioctl+0x48/0x160
[  420.937295][T18491]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  420.943478][T18491]  do_syscall_64+0x73/0xe0
[  420.947911][T18491]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  420.953814][T18491] RIP: 0033:0x45cb29
[  420.957871][T18491] Code: Bad RIP value.
03:31:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40081271, &(0x7f0000000140))

[  420.961945][T18491] RSP: 002b:00007fab348f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  420.970369][T18491] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  420.978442][T18491] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000004
[  420.986559][T18491] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  420.994541][T18491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  421.002525][T18491] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fab348fa6d4
[  421.046027][T18491] ERROR: Out of memory at tomoyo_realpath_from_path.
[  421.046959][   T27] audit: type=1804 audit(1593747077.551:106): pid=18502 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/222/bus" dev="sda1" ino=16368 res=1
03:31:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0xfffffff5}, 0x1c)

03:31:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5421, &(0x7f0000000140))

03:31:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:17 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

03:31:17 executing program 2 (fault-call:5 fault-nth:1):
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101283, &(0x7f0000000140))

03:31:18 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5450, &(0x7f0000000140))

[  421.535106][T18528] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  421.551170][T18527] FAULT_INJECTION: forcing a failure.
[  421.551170][T18527] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  421.564386][T18527] CPU: 0 PID: 18527 Comm: syz-executor.2 Not tainted 5.8.0-rc3-syzkaller #0
[  421.573066][T18527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  421.583212][T18527] Call Trace:
[  421.586522][T18527]  dump_stack+0x1f0/0x31e
[  421.590868][T18527]  should_fail+0x38a/0x4e0
[  421.595303][T18527]  prepare_alloc_pages+0x28c/0x4a0
[  421.600432][T18527]  __alloc_pages_nodemask+0xbc/0x5e0
[  421.605840][T18527]  ? kvm_sched_clock_read+0x15/0x40
[  421.611056][T18527]  ? sched_clock+0x36/0x40
[  421.615492][T18527]  kmem_getpages+0x49/0x900
[  421.620012][T18527]  cache_grow_begin+0x7b/0x2e0
[  421.624793][T18527]  cache_alloc_refill+0x359/0x3f0
[  421.629841][T18527]  ? check_preemption_disabled+0x51/0x140
03:31:18 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101286, &(0x7f0000000140))

[  421.635581][T18527]  __kmalloc+0x30c/0x330
[  421.639846][T18527]  ? tomoyo_realpath_from_path+0xd8/0x630
[  421.645584][T18527]  tomoyo_realpath_from_path+0xd8/0x630
[  421.651211][T18527]  tomoyo_path_number_perm+0x18f/0x690
[  421.656690][T18527]  ? sched_clock_cpu+0x18/0x3b0
[  421.661725][T18527]  ? kvm_sched_clock_read+0x15/0x40
[  421.666940][T18527]  ? sched_clock+0x36/0x40
[  421.671403][T18527]  security_file_ioctl+0x55/0xb0
[  421.676374][T18527]  __se_sys_ioctl+0x48/0x160
[  421.680985][T18527]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  421.687227][T18527]  do_syscall_64+0x73/0xe0
[  421.691664][T18527]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  421.697592][T18527] RIP: 0033:0x45cb29
[  421.701493][T18527] Code: Bad RIP value.
[  421.705570][T18527] RSP: 002b:00007fab348f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  421.713991][T18527] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  421.721972][T18527] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000004
03:31:18 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

[  421.729952][T18527] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  421.738021][T18527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  421.745999][T18527] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fab348fa6d4
[  421.757669][   T27] audit: type=1804 audit(1593747078.171:107): pid=18533 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/223/bus" dev="sda1" ino=16366 res=1
03:31:18 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5451, &(0x7f0000000140))

03:31:18 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:18 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101287, &(0x7f0000000140))

[  421.896360][   T27] audit: type=1804 audit(1593747078.401:108): pid=18540 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/224/bus" dev="sda1" ino=16356 res=1
03:31:18 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)

03:31:18 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

03:31:18 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101288, &(0x7f0000000140))

03:31:18 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5452, &(0x7f0000000140))

03:31:18 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:18 executing program 2 (fault-call:5 fault-nth:2):
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070c9, &(0x7f0000000140))

[  422.477791][T18563] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  422.504283][T18567] FAULT_INJECTION: forcing a failure.
[  422.504283][T18567] name failslab, interval 1, probability 0, space 0, times 0
[  422.617685][   T27] audit: type=1804 audit(1593747079.121:109): pid=18563 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/225/bus" dev="sda1" ino=16364 res=1
[  422.654096][T18567] CPU: 1 PID: 18567 Comm: syz-executor.2 Not tainted 5.8.0-rc3-syzkaller #0
[  422.662798][T18567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  422.672861][T18567] Call Trace:
[  422.676261][T18567]  dump_stack+0x1f0/0x31e
[  422.680614][T18567]  should_fail+0x38a/0x4e0
[  422.685054][T18567]  ? tomoyo_encode2+0x25a/0x560
[  422.689921][T18567]  should_failslab+0x5/0x20
[  422.694438][T18567]  __kmalloc+0x74/0x330
[  422.698621][T18567]  tomoyo_encode2+0x25a/0x560
[  422.703320][T18567]  tomoyo_realpath_from_path+0x5d6/0x630
[  422.708985][T18567]  tomoyo_path_number_perm+0x18f/0x690
03:31:19 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5460, &(0x7f0000000140))

03:31:19 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2}, 0x1c)

03:31:19 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  422.714627][T18567]  ? sched_clock_cpu+0x18/0x3b0
[  422.719495][T18567]  ? kvm_sched_clock_read+0x15/0x40
[  422.724710][T18567]  ? sched_clock+0x36/0x40
[  422.729162][T18567]  ? security_file_ioctl+0x60/0xb0
[  422.734317][T18567]  security_file_ioctl+0x55/0xb0
[  422.735485][   T27] audit: type=1804 audit(1593747079.121:110): pid=18577 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/225/bus" dev="sda1" ino=16364 res=1
[  422.739507][T18567]  __se_sys_ioctl+0x48/0x160
03:31:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070ca, &(0x7f0000000140))

[  422.739527][T18567]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  422.739540][T18567]  do_syscall_64+0x73/0xe0
[  422.739554][T18567]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  422.739566][T18567] RIP: 0033:0x45cb29
[  422.739571][T18567] Code: Bad RIP value.
[  422.739578][T18567] RSP: 002b:00007fab348f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  422.739590][T18567] RAX: ffffffffffffffda RBX: 00000000004e2320 RCX: 000000000045cb29
[  422.739598][T18567] RDX: 0000000020000140 RSI: 000000000000127d RDI: 0000000000000004
03:31:19 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

[  422.739605][T18567] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  422.739611][T18567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[  422.739619][T18567] R13: 0000000000000233 R14: 00000000004c48be R15: 00007fab348fa6d4
03:31:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070cd, &(0x7f0000000140))

03:31:19 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5501, &(0x7f0000000140))

[  422.916756][T18567] ERROR: Out of memory at tomoyo_realpath_from_path.
[  423.001508][T18596] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40186366, &(0x7f0000000140))

03:31:19 executing program 2 (fault-call:5 fault-nth:3):
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:19 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:19 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  423.105983][   T27] audit: type=1804 audit(1593747079.611:111): pid=18596 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/226/bus" dev="sda1" ino=16384 res=1
03:31:19 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5509, &(0x7f0000000140))

[  423.266545][T18609] FAT-fs (loop0): bogus number of FAT sectors
03:31:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870c8, &(0x7f0000000140))

[  423.309946][T18609] FAT-fs (loop0): Can't find a valid FAT filesystem
[  423.362822][   T27] audit: type=1804 audit(1593747079.871:112): pid=18609 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/227/file0/bus" dev="sda1" ino=16366 res=1
[  423.405668][   T27] audit: type=1804 audit(1593747079.881:113): pid=18620 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/227/file0/bus" dev="sda1" ino=16366 res=1
03:31:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x3}, 0x1c)

03:31:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:20 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:31:20 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x551f, &(0x7f0000000140))

03:31:20 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:20 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870cb, &(0x7f0000000140))

03:31:20 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x2, &(0x7f0000000140))

[  423.790471][T18639] FAT-fs (loop0): bogus number of FAT sectors
[  423.804067][T18639] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:20 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870cc, &(0x7f0000000140))

03:31:20 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x6364, &(0x7f0000000140))

03:31:20 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x10, &(0x7f0000000140))

03:31:20 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  423.936087][   T27] audit: type=1804 audit(1593747080.441:114): pid=18639 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/228/file0/bus" dev="sda1" ino=15756 res=1
[  424.092247][T18663] FAT-fs (loop0): bogus number of FAT sectors
[  424.102073][T18663] FAT-fs (loop0): Can't find a valid FAT filesystem
[  424.221608][   T27] audit: type=1804 audit(1593747080.731:115): pid=18663 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/229/file0/bus" dev="sda1" ino=16367 res=1
03:31:21 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4}, 0x1c)

03:31:21 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x7003, &(0x7f0000000140))

03:31:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4020940d, &(0x7f0000000140))

03:31:21 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x301, &(0x7f0000000140))

03:31:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:21 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4020ae46, &(0x7f0000000140))

03:31:21 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x7004, &(0x7f0000000140))

[  424.802715][T18687] FAT-fs (loop0): bogus number of FAT sectors
03:31:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:21 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125d, &(0x7f0000000140))

[  424.846566][T18687] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40286608, &(0x7f0000000140))

03:31:21 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  424.919481][   T27] audit: type=1804 audit(1593747081.431:116): pid=18687 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/230/file0/bus" dev="sda1" ino=16374 res=1
[  425.024340][T18710] FAT-fs (loop0): bogus number of FAT sectors
[  425.036573][T18710] FAT-fs (loop0): Can't find a valid FAT filesystem
[  425.127993][   T27] audit: type=1804 audit(1593747081.631:117): pid=18710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/231/file0/bus" dev="sda1" ino=16370 res=1
03:31:22 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5}, 0x1c)

03:31:22 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8912, &(0x7f0000000140))

03:31:22 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125e, &(0x7f0000000140))

03:31:22 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x404c534a, &(0x7f0000000140))

03:31:22 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80041284, &(0x7f0000000140))

03:31:22 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8914, &(0x7f0000000140))

03:31:22 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x125f, &(0x7f0000000140))

[  425.746813][T18732] FAT-fs (loop0): bogus number of FAT sectors
[  425.766356][T18732] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:22 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80041285, &(0x7f0000000140))

03:31:22 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  426.011642][T18755] FAT-fs (loop0): bogus number of FAT sectors
[  426.017881][T18755] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:23 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x6}, 0x1c)

03:31:23 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8933, &(0x7f0000000140))

03:31:23 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1260, &(0x7f0000000140))

03:31:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80081270, &(0x7f0000000140))

03:31:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:23 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:23 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xae01, &(0x7f0000000140))

03:31:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80081272, &(0x7f0000000140))

03:31:23 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1261, &(0x7f0000000140))

[  426.739544][T18778] FAT-fs (loop0): bogus number of FAT sectors
[  426.766295][T18778] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:23 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xae41, &(0x7f0000000140))

03:31:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80086301, &(0x7f0000000140))

[  426.900025][   T27] kauditd_printk_skb: 3 callbacks suppressed
[  426.900035][   T27] audit: type=1804 audit(1593747083.411:121): pid=18788 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/234/file0/bus" dev="sda1" ino=16368 res=1
03:31:24 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x7}, 0x1c)

03:31:24 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1262, &(0x7f0000000140))

03:31:24 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00'}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:24 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xae60, &(0x7f0000000140))

03:31:24 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140))

03:31:24 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:24 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1263, &(0x7f0000000140))

03:31:24 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140))

[  427.671931][T18822] FAT-fs (loop0): bogus number of FAT sectors
[  427.685968][T18822] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:24 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xae80, &(0x7f0000000140))

03:31:24 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1264, &(0x7f0000000140))

03:31:24 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc00c642e, &(0x7f0000000140))

03:31:24 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  427.830112][   T27] audit: type=1804 audit(1593747084.341:122): pid=18839 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/235/file0/bus" dev="sda1" ino=16382 res=1
03:31:25 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8}, 0x1c)

03:31:25 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1265, &(0x7f0000000140))

03:31:25 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0101282, &(0x7f0000000140))

03:31:25 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xae9a, &(0x7f0000000140))

03:31:25 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:25 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:25 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x400454ca, &(0x7f0000000140))

03:31:25 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0184900, &(0x7f0000000140))

03:31:25 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1267, &(0x7f0000000140))

03:31:25 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:25 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0189436, &(0x7f0000000140))

03:31:25 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x400454dc, &(0x7f0000000140))

[  428.754209][   T27] audit: type=1804 audit(1593747085.261:123): pid=18864 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/236/file0/bus" dev="sda1" ino=16372 res=1
03:31:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x9}, 0x1c)

03:31:26 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1268, &(0x7f0000000140))

03:31:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc020660b, &(0x7f0000000140))

03:31:26 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4004550a, &(0x7f0000000140))

03:31:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0406619, &(0x7f0000000140))

03:31:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0481273, &(0x7f0000000140))

03:31:26 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40045564, &(0x7f0000000140))

03:31:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1269, &(0x7f0000000140))

[  429.676450][   T27] audit: type=1804 audit(1593747086.181:124): pid=18908 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/237/file0/bus" dev="sda1" ino=16033 res=1
03:31:26 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  429.926741][   T27] audit: type=1804 audit(1593747086.431:125): pid=18937 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/238/file0/bus" dev="sda1" ino=15811 res=1
03:31:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa}, 0x1c)

03:31:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc10c5541, &(0x7f0000000140))

03:31:26 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40049409, &(0x7f0000000140))

03:31:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1274, &(0x7f0000000140))

03:31:26 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:27 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc4c85513, &(0x7f0000000140))

03:31:27 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:27 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2)

03:31:27 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40081271, &(0x7f0000000140))

03:31:27 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1275, &(0x7f0000000140))

03:31:27 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40085503, &(0x7f0000000140))

[  430.648111][   T27] audit: type=1804 audit(1593747087.151:126): pid=18963 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/239/bus" dev="sda1" ino=16081 res=1
03:31:27 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf}, 0x1c)

03:31:27 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:27 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:27 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3)

03:31:27 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40086602, &(0x7f0000000140))

03:31:27 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1276, &(0x7f0000000140))

03:31:27 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4008ae89, &(0x7f0000000140))

03:31:28 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4)

03:31:28 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1277, &(0x7f0000000140))

[  431.532694][   T27] audit: type=1804 audit(1593747088.041:127): pid=19004 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/240/bus" dev="sda1" ino=15825 res=1
03:31:28 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4008ae90, &(0x7f0000000140))

03:31:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:28 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  431.763560][   T27] audit: type=1804 audit(1593747088.271:128): pid=19029 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/241/bus" dev="sda1" ino=15758 res=1
03:31:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x54}, 0x1c)

03:31:28 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5)

03:31:28 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1278, &(0x7f0000000140))

03:31:28 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40095505, &(0x7f0000000140))

03:31:28 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6)

03:31:29 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101283, &(0x7f0000000140))

[  432.444820][T19050] FAT-fs (loop0): bread failed, FSINFO block (sector = 1)
03:31:29 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x1279, &(0x7f0000000140))

03:31:29 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:29 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101286, &(0x7f0000000140))

03:31:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7)

[  432.589852][   T27] audit: type=1804 audit(1593747089.101:129): pid=19050 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/242/file0/bus" dev="sda1" ino=15890 res=1
03:31:29 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x58}, 0x1c)

03:31:29 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127a, &(0x7f0000000140))

03:31:29 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8)

03:31:29 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101287, &(0x7f0000000140))

03:31:29 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:29 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101288, &(0x7f0000000140))

[  433.348877][T19092] FAT-fs (loop0): bread failed, FSINFO block (sector = 1)
03:31:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9)

03:31:29 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127b, &(0x7f0000000140))

03:31:30 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070c9, &(0x7f0000000140))

03:31:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:30 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa)

[  433.494970][   T27] audit: type=1804 audit(1593747090.001:130): pid=19092 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/243/file0/bus" dev="sda1" ino=15811 res=1
03:31:30 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfc}, 0x1c)

03:31:30 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:30 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127c, &(0x7f0000000140))

03:31:30 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070ca, &(0x7f0000000140))

03:31:30 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb)

03:31:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:30 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070cd, &(0x7f0000000140))

03:31:30 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127e, &(0x7f0000000140))

[  434.335780][T19138] FAT-fs (loop0): bread failed, FSINFO block (sector = 1)
03:31:30 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc)

03:31:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:31 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4010ae67, &(0x7f0000000140))

[  434.464489][   T27] audit: type=1804 audit(1593747090.971:131): pid=19138 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/244/file0/bus" dev="sda1" ino=15905 res=1
03:31:31 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  434.612057][T19162] FAT-fs (loop0): bogus number of reserved sectors
[  434.618885][T19162] FAT-fs (loop0): Can't find a valid FAT filesystem
[  434.712284][   T27] audit: type=1804 audit(1593747091.221:132): pid=19162 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/245/file0/bus" dev="sda1" ino=15763 res=1
03:31:31 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x1f4}, 0x1c)

03:31:31 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127f, &(0x7f0000000140))

03:31:31 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd)

03:31:31 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4010ae94, &(0x7f0000000140))

03:31:31 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:31 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:31 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe)

03:31:31 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4010aeac, &(0x7f0000000140))

[  435.254669][T19183] FAT-fs (loop0): bogus number of reserved sectors
[  435.285230][T19183] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:31 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x2403, &(0x7f0000000140))

03:31:31 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:31 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf)

03:31:31 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  435.406695][   T27] audit: type=1804 audit(1593747091.911:133): pid=19183 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/246/file0/bus" dev="sda1" ino=15907 res=1
[  435.513865][T19206] FAT-fs (loop0): bogus number of reserved sectors
[  435.524634][T19206] FAT-fs (loop0): Can't find a valid FAT filesystem
[  435.596351][   T27] audit: type=1804 audit(1593747092.101:134): pid=19206 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/247/file0/bus" dev="sda1" ino=15755 res=1
03:31:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x218}, 0x1c)

03:31:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x2405, &(0x7f0000000140))

03:31:32 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40186366, &(0x7f0000000140))

03:31:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10)

03:31:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:32 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:32 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870c8, &(0x7f0000000140))

03:31:32 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870cb, &(0x7f0000000140))

03:31:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11)

[  436.219194][T19226] FAT-fs (loop0): bogus number of reserved sectors
[  436.234327][T19226] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4b70, &(0x7f0000000140))

03:31:32 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870cc, &(0x7f0000000140))

[  436.346386][   T27] audit: type=1804 audit(1593747092.851:135): pid=19226 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/248/file0/bus" dev="sda1" ino=15890 res=1
03:31:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x241}, 0x1c)

03:31:33 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12)

03:31:33 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4020940d, &(0x7f0000000140))

03:31:33 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:33 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c00, &(0x7f0000000140))

03:31:33 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:33 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4020ae46, &(0x7f0000000140))

03:31:33 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x13)

[  437.109814][T19267] FAT-fs (loop0): bogus number of reserved sectors
[  437.116430][T19267] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:33 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:33 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4028700f, &(0x7f0000000140))

03:31:33 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c01, &(0x7f0000000140))

[  437.222207][   T27] audit: type=1804 audit(1593747093.731:136): pid=19267 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/249/file0/bus" dev="sda1" ino=16337 res=1
03:31:33 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x14)

03:31:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x300}, 0x1c)

03:31:34 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, &(0x7f0000000000), 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:34 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40485404, &(0x7f0000000140))

03:31:34 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x15)

03:31:34 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:34 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c04, &(0x7f0000000140))

03:31:34 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x16)

03:31:34 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x405c5503, &(0x7f0000000140))

03:31:34 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  438.169731][T19310] FAT-fs (loop0): bogus number of reserved sectors
[  438.176470][T19310] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:34 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4c05, &(0x7f0000000140))

03:31:34 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4090ae82, &(0x7f0000000140))

03:31:34 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x17)

[  438.311858][   T27] audit: type=1804 audit(1593747094.821:137): pid=19310 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/250/file0/bus" dev="sda1" ino=16364 res=1
03:31:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x3e8}, 0x1c)

03:31:35 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:35 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x41015500, &(0x7f0000000140))

03:31:35 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x18)

03:31:35 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x540a, &(0x7f0000000140))

03:31:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x19)

03:31:35 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5419, &(0x7f0000000140))

[  439.057480][T19349] FAT-fs (loop0): bogus number of reserved sectors
[  439.090236][T19349] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:35 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x41045508, &(0x7f0000000140))

03:31:35 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  439.193265][   T27] audit: type=1804 audit(1593747095.701:138): pid=19349 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/251/file0/bus" dev="sda1" ino=16368 res=1
03:31:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a)

03:31:35 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  439.358119][T19375] FAT-fs (loop0): bogus number of reserved sectors
[  439.366696][T19375] FAT-fs (loop0): Can't find a valid FAT filesystem
[  439.460394][   T27] audit: type=1804 audit(1593747095.971:139): pid=19375 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/252/file0/bus" dev="sda1" ino=16368 res=1
03:31:36 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4b8}, 0x1c)

03:31:36 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x541b, &(0x7f0000000140))

03:31:36 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4138ae84, &(0x7f0000000140))

03:31:36 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b)

03:31:36 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:36 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:36 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c)

03:31:36 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4400ae8f, &(0x7f0000000140))

03:31:36 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5421, &(0x7f0000000140))

[  440.032050][T19397] FAT-fs (loop0): bogus number of reserved sectors
[  440.053639][T19397] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:36 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:36 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5450, &(0x7f0000000140))

03:31:36 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80041284, &(0x7f0000000140))

[  440.169930][   T27] audit: type=1804 audit(1593747096.681:140): pid=19397 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/253/file0/bus" dev="sda1" ino=16379 res=1
03:31:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x500}, 0x1c)

03:31:37 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d)

03:31:37 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:37 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80041285, &(0x7f0000000140))

03:31:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:37 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5451, &(0x7f0000000140))

03:31:37 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e)

[  440.967152][T19436] FAT-fs (loop0): bogus number of reserved sectors
[  440.989452][T19436] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:37 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8004562e, &(0x7f0000000140))

03:31:37 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5452, &(0x7f0000000140))

03:31:37 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x21)

03:31:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  441.123325][   T27] audit: type=1804 audit(1593747097.631:141): pid=19436 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/254/file0/bus" dev="sda1" ino=16364 res=1
03:31:37 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  441.301245][T19463] FAT-fs (loop0): bogus number of reserved sectors
[  441.325739][T19463] FAT-fs (loop0): Can't find a valid FAT filesystem
[  441.404648][   T27] audit: type=1804 audit(1593747097.911:142): pid=19463 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/255/file0/bus" dev="sda1" ino=16366 res=1
[  441.543021][    T0] NOHZ: local_softirq_pending 08
03:31:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x600}, 0x1c)

03:31:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80047601, &(0x7f0000000140))

03:31:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x22)

03:31:38 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5460, &(0x7f0000000140))

03:31:38 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x139}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:38 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x23)

03:31:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80081270, &(0x7f0000000140))

[  441.975634][T19481] FAT-fs (loop0): bogus number of reserved sectors
03:31:38 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5501, &(0x7f0000000140))

[  442.021883][T19481] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:38 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x24)

03:31:38 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80081272, &(0x7f0000000140))

[  442.159120][   T27] audit: type=1804 audit(1593747098.671:143): pid=19481 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/256/file0/bus" dev="sda1" ino=16377 res=1
03:31:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x700}, 0x1c)

03:31:39 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:39 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5502, &(0x7f0000000140))

03:31:39 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25)

03:31:39 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80084504, &(0x7f0000000140))

03:31:39 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:39 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x26)

03:31:39 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80085502, &(0x7f0000000140))

[  442.913109][T19524] FAT-fs (loop0): bogus number of reserved sectors
[  442.924985][T19524] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:39 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x5509, &(0x7f0000000140))

03:31:39 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:39 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x27)

[  443.057513][   T27] audit: type=1804 audit(1593747099.561:144): pid=19524 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/257/file0/bus" dev="sda1" ino=16370 res=1
03:31:39 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  443.209494][T19548] FAT-fs (loop0): bogus number of reserved sectors
[  443.222861][T19548] FAT-fs (loop0): Can't find a valid FAT filesystem
[  443.314952][   T27] audit: type=1804 audit(1593747099.821:145): pid=19548 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/258/file0/bus" dev="sda1" ino=16367 res=1
03:31:40 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x900}, 0x1c)

03:31:40 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80086301, &(0x7f0000000140))

03:31:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x28)

03:31:40 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x6364, &(0x7f0000000140))

03:31:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:40 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x29)

03:31:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:40 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8138ae83, &(0x7f0000000140))

[  443.917659][T19573] FAT-fs (loop0): bogus number of reserved sectors
[  443.970684][T19573] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2a)

[  444.104306][   T27] audit: type=1804 audit(1593747100.611:146): pid=19582 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/259/file0/bus" dev="sda1" ino=16390 res=1
03:31:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:40 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140))

03:31:41 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa00}, 0x1c)

03:31:41 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2b)

03:31:41 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x6611, &(0x7f0000000140))

03:31:41 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140))

03:31:41 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2c)

03:31:41 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0085504, &(0x7f0000000140))

03:31:41 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x770a, &(0x7f0000000140))

[  444.837307][T19614] FAT-fs (loop0): invalid media value (0x00)
[  444.856938][T19614] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:41 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2d)

[  444.963252][   T27] audit: type=1804 audit(1593747101.471:147): pid=19614 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/260/file0/bus" dev="sda1" ino=16382 res=1
03:31:41 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  445.113613][T19640] FAT-fs (loop0): invalid media value (0x00)
[  445.119913][T19640] FAT-fs (loop0): Can't find a valid FAT filesystem
[  445.205883][   T27] audit: type=1804 audit(1593747101.711:148): pid=19640 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/261/file0/bus" dev="sda1" ino=16367 res=1
03:31:42 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf00}, 0x1c)

03:31:42 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc008ae05, &(0x7f0000000140))

03:31:42 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2e)

03:31:42 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8902, &(0x7f0000000140))

03:31:42 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xd00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:42 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:42 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2f)

03:31:42 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0101282, &(0x7f0000000140))

03:31:42 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc01064c7, &(0x7f0000000140))

[  445.779155][T19657] FAT-fs (loop0): invalid media value (0x00)
[  445.800721][T19657] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:42 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8912, &(0x7f0000000140))

03:31:42 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:42 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x30)

[  445.898975][   T27] audit: type=1804 audit(1593747102.411:149): pid=19657 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/262/file0/bus" dev="sda1" ino=16381 res=1
[  446.029445][T19680] FAT-fs (loop0): invalid media value (0x00)
[  446.053102][T19680] FAT-fs (loop0): Can't find a valid FAT filesystem
[  446.134575][   T27] audit: type=1804 audit(1593747102.641:150): pid=19680 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/263/file0/bus" dev="sda1" ino=16364 res=1
03:31:43 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x1802}, 0x1c)

03:31:43 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:43 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc018480d, &(0x7f0000000140))

03:31:43 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8916, &(0x7f0000000140))

03:31:43 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x31)

03:31:43 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:43 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x32)

03:31:43 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0189436, &(0x7f0000000140))

[  446.788444][T19699] FAT-fs (loop0): invalid media value (0x00)
[  446.807118][T19699] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:43 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8933, &(0x7f0000000140))

03:31:43 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  446.906763][   T27] audit: type=1804 audit(1593747103.411:151): pid=19699 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/264/file0/bus" dev="sda1" ino=15751 res=1
03:31:43 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc018aa3f, &(0x7f0000000140))

03:31:43 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  447.092264][T19724] FAT-fs (loop0): invalid media value (0x00)
[  447.119883][T19724] FAT-fs (loop0): Can't find a valid FAT filesystem
[  447.202569][   T27] audit: type=1804 audit(1593747103.711:152): pid=19724 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/265/file0/bus" dev="sda1" ino=16363 res=1
03:31:44 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2000}, 0x1c)

03:31:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x33)

03:31:44 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x8955, &(0x7f0000000140))

03:31:44 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc020660b, &(0x7f0000000140))

03:31:44 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:44 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x34)

03:31:44 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40042408, &(0x7f0000000140))

03:31:44 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc020aa00, &(0x7f0000000140))

03:31:44 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1200}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  447.828193][T19746] FAT-fs (loop0): invalid media value (0x00)
[  447.842601][T19746] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:44 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0305710, &(0x7f0000000140))

03:31:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x35)

[  447.976919][   T27] audit: type=1804 audit(1593747104.481:153): pid=19746 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/266/file0/bus" dev="sda1" ino=16380 res=1
03:31:45 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2ee0}, 0x1c)

03:31:45 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x400454ca, &(0x7f0000000140))

03:31:45 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:45 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x36)

03:31:45 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0481273, &(0x7f0000000140))

03:31:45 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  448.742492][T19783] FAT-fs (loop0): invalid media value (0x00)
[  448.755325][T19783] FAT-fs (loop0): Can't find a valid FAT filesystem
03:31:45 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x400454cd, &(0x7f0000000140))

03:31:45 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x37)

03:31:45 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc06864a2, &(0x7f0000000140))

[  448.832790][   T27] audit: type=1804 audit(1593747105.341:154): pid=19783 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/267/file0/bus" dev="sda1" ino=16366 res=1
03:31:45 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:45 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3901}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:45 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40045506, &(0x7f0000000140))

[  449.043553][T19810] FAT-fs (loop0): invalid media value (0x00)
[  449.052024][T19810] FAT-fs (loop0): Can't find a valid FAT filesystem
[  449.152675][   T27] audit: type=1804 audit(1593747105.661:155): pid=19810 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/268/file0/bus" dev="sda1" ino=16374 res=1
03:31:46 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4000}, 0x1c)

03:31:46 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x38)

03:31:46 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0bc5310, &(0x7f0000000140))

03:31:46 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4004550a, &(0x7f0000000140))

03:31:46 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:46 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:46 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x39)

[  449.686743][T19831] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:46 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0d05604, &(0x7f0000000140))

03:31:46 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40045564, &(0x7f0000000140))

03:31:46 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4788}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:46 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2)

[  449.892335][   T27] audit: type=1804 audit(1593747106.401:156): pid=19831 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/269/bus" dev="sda1" ino=16369 res=1
03:31:46 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3)

[  450.501879][    T0] NOHZ: local_softirq_pending 08
03:31:47 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4102}, 0x1c)

03:31:47 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:47 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3a)

03:31:47 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:47 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4)

03:31:47 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40045566, &(0x7f0000000140))

[  450.714537][T19876] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:47 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3b)

03:31:47 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40049409, &(0x7f0000000140))

03:31:47 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5)

03:31:47 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3c)

03:31:47 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  450.880746][   T27] audit: type=1804 audit(1593747107.381:157): pid=19876 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/270/bus" dev="sda1" ino=16376 res=1
03:31:47 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(0x0, 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  451.057971][T19902] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  451.160665][   T27] audit: type=1804 audit(1593747107.671:158): pid=19902 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/271/bus" dev="sda1" ino=16364 res=1
03:31:48 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5400}, 0x1c)

03:31:48 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40081271, &(0x7f0000000140))

03:31:48 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6)

03:31:48 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3d)

03:31:48 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:48 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

[  451.664820][T19919] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:48 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3e)

03:31:48 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7)

03:31:48 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:48 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40085503, &(0x7f0000000140))

[  451.817294][   T27] audit: type=1804 audit(1593747108.321:159): pid=19932 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/272/bus" dev="sda1" ino=16370 res=1
03:31:48 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

[  451.877183][   T27] audit: type=1804 audit(1593747108.321:160): pid=19919 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/272/bus" dev="sda1" ino=16370 res=1
03:31:48 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c)

[  452.049440][T19949] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  452.124766][   T27] audit: type=1804 audit(1593747108.631:161): pid=19949 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/273/bus" dev="sda1" ino=16369 res=1
03:31:49 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5800}, 0x1c)

03:31:49 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8)

03:31:49 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40086602, &(0x7f0000000140))

03:31:49 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:49 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf0)

03:31:49 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r0 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r0, r2, 0x0, 0x8400fffffffb)

03:31:49 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300)

[  452.595162][T19965] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:49 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  452.669758][   T27] audit: type=1804 audit(1593747109.181:162): pid=19965 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/274/bus" dev="sda1" ino=16382 res=1
03:31:49 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8847}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:49 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9)

03:31:49 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500)

03:31:49 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4008ae89, &(0x7f0000000140))

[  452.846111][T19986] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  452.876058][   T27] audit: type=1804 audit(1593747109.381:163): pid=19986 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/275/file0/bus" dev="loop0" ino=84 res=1
[  452.922225][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x80fe}, 0x1c)

03:31:50 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:50 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa)

03:31:50 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8848}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:50 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600)

03:31:50 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40095505, &(0x7f0000000140))

[  453.628524][T20007] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  453.658329][   T27] audit: type=1804 audit(1593747110.161:164): pid=20007 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/276/file0/bus" dev="loop0" ino=85 res=1
03:31:50 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb)

03:31:50 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:50 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101283, &(0x7f0000000140))

03:31:50 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700)

03:31:50 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  453.734791][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:50 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc)

[  453.866579][T20031] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  453.936337][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xb804}, 0x1c)

03:31:51 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900)

03:31:51 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101286, &(0x7f0000000140))

03:31:51 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:51 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd)

03:31:51 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  454.573215][T20050] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  454.605979][   T27] kauditd_printk_skb: 1 callbacks suppressed
03:31:51 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:51 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00)

03:31:51 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101287, &(0x7f0000000140))

[  454.605990][   T27] audit: type=1804 audit(1593747111.111:166): pid=20050 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/278/file0/bus" dev="loop0" ino=87 res=1
[  454.644237][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:51 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:51 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00)

03:31:51 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe)

[  454.799846][T20071] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  454.816408][   T27] audit: type=1804 audit(1593747111.321:167): pid=20071 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/279/file0/bus" dev="loop0" ino=88 res=1
[  454.844181][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xc4ff}, 0x1c)

03:31:51 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:51 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10)

03:31:51 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40101288, &(0x7f0000000140))

03:31:51 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00)

03:31:51 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  455.537458][T20091] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:52 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  455.569721][   T27] audit: type=1804 audit(1593747112.081:168): pid=20091 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/280/file0/bus" dev="loop0" ino=89 res=1
03:31:52 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11)

03:31:52 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00)

03:31:52 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070c9, &(0x7f0000000140))

03:31:52 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  455.612085][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:52 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12)

[  455.780482][T20111] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  455.890314][   T27] audit: type=1804 audit(1593747112.401:169): pid=20111 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/281/file0/bus" dev="loop0" ino=90 res=1
[  455.958933][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:52 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe02e}, 0x1c)

03:31:52 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25)

03:31:52 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070ca, &(0x7f0000000140))

03:31:52 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00)

03:31:52 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:52 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  456.536001][T20132] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:53 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c)

03:31:53 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401070cd, &(0x7f0000000140))

[  456.565584][   T27] audit: type=1804 audit(1593747113.071:170): pid=20132 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/282/file0/bus" dev="loop0" ino=91 res=1
03:31:53 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:53 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf00)

[  456.706334][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:53 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:53 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300)

[  456.875052][T20158] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  456.961476][   T27] audit: type=1804 audit(1593747113.471:171): pid=20158 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/283/file0/bus" dev="loop0" ino=92 res=1
[  456.988254][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:53 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe803}, 0x1c)

03:31:53 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100)

03:31:53 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40184150, &(0x7f0000000140))

03:31:53 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500)

03:31:53 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:53 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:54 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600)

03:31:54 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40186366, &(0x7f0000000140))

03:31:54 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200)

[  457.546472][T20177] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:54 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1300)

[  457.621457][   T27] audit: type=1804 audit(1593747114.131:172): pid=20177 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/284/file0/bus" dev="loop0" ino=93 res=1
03:31:54 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1400)

03:31:54 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  457.785814][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:54 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf401}, 0x1c)

03:31:54 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700)

03:31:54 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1500)

03:31:54 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:54 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870c8, &(0x7f0000000140))

03:31:54 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:55 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900)

03:31:55 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1600)

[  458.554491][T20217] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:55 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00)

03:31:55 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:55 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870cb, &(0x7f0000000140))

03:31:55 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00)

[  458.729565][   T27] audit: type=1804 audit(1593747115.241:173): pid=20217 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/285/file0/bus" dev="loop0" ino=94 res=1
[  458.849090][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:55 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfc00}, 0x1c)

03:31:55 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1700)

03:31:55 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:55 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00)

03:31:55 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x401870cc, &(0x7f0000000140))

03:31:55 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  459.511092][T20258] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:56 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1800)

03:31:56 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00)

03:31:56 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4020940d, &(0x7f0000000140))

[  459.589345][   T27] audit: type=1804 audit(1593747116.101:174): pid=20258 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/286/file0/bus" dev="loop0" ino=95 res=1
03:31:56 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:56 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1900)

03:31:56 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(0x0, 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  459.728821][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  459.806448][T20282] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  459.840911][   T27] audit: type=1804 audit(1593747116.351:175): pid=20282 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/287/file0/bus" dev="loop0" ino=96 res=1
[  459.865494][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:56 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfe80}, 0x1c)

03:31:56 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00)

03:31:56 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x4030582a, &(0x7f0000000140))

03:31:56 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a00)

03:31:56 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(0x0, 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:56 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:56 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100)

[  460.438371][T20299] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:57 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b00)

03:31:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40305839, &(0x7f0000000140))

03:31:57 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200)

03:31:57 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  460.565468][   T27] audit: type=1804 audit(1593747117.071:176): pid=20299 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/288/file0/bus" dev="loop0" ino=97 res=1
03:31:57 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(0x0, 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  460.652195][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  460.836614][T20322] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  460.905803][   T27] audit: type=1804 audit(1593747117.411:177): pid=20322 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/289/file0/bus" dev="loop0" ino=98 res=1
[  460.996609][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:57 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff00}, 0x1c)

03:31:57 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c00)

03:31:57 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x40806685, &(0x7f0000000140))

03:31:57 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500)

03:31:57 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:57 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:57 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00)

03:31:57 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x20000)

03:31:57 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d00)

[  461.350247][T20343] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:58 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e00)

03:31:58 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x41015500, &(0x7f0000000140))

03:31:58 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  461.451456][   T27] audit: type=1804 audit(1593747117.961:178): pid=20343 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/290/file0/bus" dev="loop0" ino=99 res=1
[  461.608426][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:58 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff0f}, 0x1c)

03:31:58 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80041284, &(0x7f0000000140))

03:31:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x40000)

03:31:58 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:58 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1f00)

03:31:58 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:58 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000)

03:31:58 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80041285, &(0x7f0000000140))

03:31:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x60000)

[  462.311966][T20388] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x80000)

03:31:58 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa0000)

[  462.403824][   T27] audit: type=1804 audit(1593747118.911:179): pid=20388 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/291/file0/bus" dev="loop0" ino=100 res=1
03:31:59 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  462.540503][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:59 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffc4}, 0x1c)

03:31:59 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc0000)

03:31:59 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2100)

03:31:59 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80045200, &(0x7f0000000140))

03:31:59 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:31:59 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:31:59 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe0000)

03:31:59 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2200)

03:31:59 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000)

[  463.244167][T20422] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:31:59 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80081270, &(0x7f0000000140))

03:31:59 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2300)

[  463.333686][   T27] audit: type=1804 audit(1593747119.841:180): pid=20422 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/292/file0/bus" dev="loop0" ino=101 res=1
03:31:59 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  463.427767][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:00 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x34000}, 0x1c)

03:32:00 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(0x0, 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:00 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2400)

03:32:00 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000)

03:32:00 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80081272, &(0x7f0000000140))

03:32:00 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:00 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500)

[  464.179144][T20463] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:00 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000000)

03:32:00 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80085502, &(0x7f0000000140))

03:32:00 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:00 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2600)

[  464.370396][   T27] audit: type=1804 audit(1593747120.881:181): pid=20463 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/293/file0/bus" dev="loop0" ino=102 res=1
03:32:00 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x80086301, &(0x7f0000000140))

[  464.501886][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:01 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x40000}, 0x1c)

03:32:01 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(0x0, 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:01 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000)

03:32:01 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x139}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:01 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2700)

03:32:01 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140))

[  465.093651][T20506] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:01 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5000000)

03:32:01 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2800)

[  465.228450][   T27] audit: type=1804 audit(1593747121.731:182): pid=20506 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/294/file0/bus" dev="loop0" ino=103 res=1
03:32:01 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0045878, &(0x7f0000000140))

03:32:01 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:01 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(0x0, 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:01 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc008240a, &(0x7f0000000140))

[  465.354019][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  465.445543][T20533] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  465.515484][   T27] audit: type=1804 audit(1593747122.021:183): pid=20533 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/295/file0/bus" dev="loop0" ino=104 res=1
[  465.573666][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:02 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x50000}, 0x1c)

03:32:02 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000)

03:32:02 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2900)

03:32:02 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0085504, &(0x7f0000000140))

03:32:02 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:02 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:02 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2a00)

[  466.052661][T20556] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:02 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2b00)

03:32:02 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2c00)

[  466.133728][   T27] audit: type=1804 audit(1593747122.641:184): pid=20556 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/296/file0/bus" dev="loop0" ino=105 res=1
03:32:02 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:02 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2d00)

03:32:02 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7000000)

[  466.284819][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:03 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x400300}, 0x1c)

03:32:03 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0101282, &(0x7f0000000140))

03:32:03 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:03 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2e00)

03:32:03 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000)

03:32:03 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:03 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2f00)

03:32:03 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9000000)

03:32:03 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000)

[  466.996186][T20594] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  467.079773][   T27] audit: type=1804 audit(1593747123.591:185): pid=20594 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/297/file0/bus" dev="loop0" ino=106 res=1
03:32:03 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb000000)

03:32:03 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0189436, &(0x7f0000000140))

03:32:03 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  467.263166][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:04 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x1000000}, 0x1c)

03:32:04 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000)

03:32:04 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000)

03:32:04 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc020660b, &(0x7f0000000140))

03:32:04 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3100)

03:32:04 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd000000)

[  467.993673][T20638] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:04 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(0x0, 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  468.034656][   T27] audit: type=1804 audit(1593747124.541:186): pid=20638 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/298/file0/bus" dev="loop0" ino=107 res=1
[  468.069647][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:04 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc028660f, &(0x7f0000000140))

03:32:04 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:04 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3200)

[  468.269970][T20659] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  468.354507][   T27] audit: type=1804 audit(1593747124.851:187): pid=20659 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/299/file0/bus" dev="loop0" ino=108 res=1
[  468.428842][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:05 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2000000}, 0x1c)

03:32:05 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc028aa03, &(0x7f0000000140))

03:32:05 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000)

03:32:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3300)

03:32:05 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(0x0, 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:05 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:05 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000)

[  468.878050][T20681] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:05 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(0x0, 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:05 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc040564a, &(0x7f0000000140))

03:32:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3400)

[  468.920272][   T27] audit: type=1804 audit(1593747125.431:188): pid=20681 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/300/file0/bus" dev="loop0" ino=109 res=1
[  468.957464][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:05 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3500)

[  469.148476][T20703] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  469.192015][   T27] audit: type=1804 audit(1593747125.701:189): pid=20703 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/301/file0/bus" dev="loop0" ino=110 res=1
[  469.226362][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:06 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x3000000}, 0x1c)

03:32:06 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0481273, &(0x7f0000000140))

03:32:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11000000)

03:32:06 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3600)

03:32:06 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:06 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:06 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3700)

03:32:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12000000)

[  469.831980][T20721] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:06 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0xc0f85403, &(0x7f0000000140))

03:32:06 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:06 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25000000)

03:32:06 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3800)

[  470.029569][   T27] audit: type=1804 audit(1593747126.541:190): pid=20739 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/302/bus" dev="sda1" ino=16377 res=1
[  470.134371][   T27] audit: type=1804 audit(1593747126.591:191): pid=20721 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/302/bus" dev="sda1" ino=16377 res=1
03:32:07 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x4000000}, 0x1c)

03:32:07 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:07 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c000000)

03:32:07 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2)

03:32:07 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3900)

03:32:07 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:07 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3)

[  470.790279][T20763] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:07 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1200}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:07 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3a00)

03:32:07 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000)

03:32:07 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4)

03:32:07 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000000000)

[  470.928318][   T27] audit: type=1804 audit(1593747127.431:192): pid=20763 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/303/bus" dev="sda1" ino=16368 res=1
[  471.039926][   T27] audit: type=1804 audit(1593747127.431:193): pid=20763 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/303/bus" dev="sda1" ino=16368 res=1
03:32:08 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x5000000}, 0x1c)

03:32:08 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:08 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:08 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3b00)

03:32:08 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5)

03:32:08 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000000000)

03:32:08 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6)

[  471.747806][T20803] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:08 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3c00)

03:32:08 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000000000)

[  471.800405][   T27] audit: type=1804 audit(1593747128.311:194): pid=20803 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/304/file0/bus" dev="loop0" ino=111 res=1
[  471.854659][   T27] audit: type=1804 audit(1593747128.321:195): pid=20803 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/304/file0/bus" dev="loop0" ino=111 res=1
03:32:08 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(0x0, &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:08 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3901}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:08 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3d00)

[  471.943961][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  472.078155][T20831] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  472.123779][   T27] audit: type=1804 audit(1593747128.631:196): pid=20831 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/305/file0/bus" dev="loop0" ino=112 res=1
[  472.158844][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:09 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x6000000}, 0x1c)

03:32:09 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7)

03:32:09 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000000000)

03:32:09 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3e00)

03:32:09 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(0x0, &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:09 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  472.661247][T20845] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:09 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(0x0, &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  472.709962][   T27] audit: type=1804 audit(1593747129.221:197): pid=20845 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/306/file0/bus" dev="loop0" ino=113 res=1
03:32:09 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f00)

03:32:09 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000000000)

03:32:09 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4788}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  472.757857][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:09 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8)

03:32:09 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000000000)

[  472.933892][T20865] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  473.052751][   T27] audit: type=1804 audit(1593747129.561:198): pid=20876 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/307/file0/bus" dev="loop0" ino=114 res=1
[  473.164794][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:10 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x7000000}, 0x1c)

03:32:10 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000)

03:32:10 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000000000)

03:32:10 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:10 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9)

03:32:10 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:10 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00)

03:32:10 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000000000000)

[  473.673310][T20891] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:10 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:10 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf0ff)

03:32:10 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xfff0)

[  473.708060][   T27] audit: type=1804 audit(1593747130.211:199): pid=20891 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/308/file0/bus" dev="loop0" ino=115 res=1
[  473.756726][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:10 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  473.913823][T20913] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  473.984542][   T27] audit: type=1804 audit(1593747130.491:200): pid=20913 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/309/file0/bus" dev="loop0" ino=116 res=1
[  474.049143][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:11 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8000000}, 0x1c)

03:32:11 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa)

03:32:11 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x200000000000000)

03:32:11 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x20000)

03:32:11 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:11 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', 0x0)
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:11 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x40000)

03:32:11 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300000000000000)

[  474.580445][T20931] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:11 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

[  474.670527][   T27] audit: type=1804 audit(1593747131.181:201): pid=20931 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/310/file0/bus" dev="loop0" ino=117 res=1
03:32:11 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb)

[  474.715996][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:11 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:11 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc)

[  474.859192][T20954] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  474.955628][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:12 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x9000000}, 0x1c)

03:32:12 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x60000)

03:32:12 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x400000000000000)

03:32:12 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd)

03:32:12 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

03:32:12 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:12 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe)

03:32:12 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500000000000000)

03:32:12 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x80000)

[  475.621107][T20978] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:12 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10)

03:32:12 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8847}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:12 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600000000000000)

[  475.879754][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa000000}, 0x1c)

03:32:13 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11)

03:32:13 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa0000)

03:32:13 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r2, 0x0, 0x8400fffffffb)

03:32:13 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700000000000000)

03:32:13 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8848}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  476.559867][T21018] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:13 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, 0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:13 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x800000000000000)

03:32:13 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc0000)

03:32:13 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12)

[  476.601323][   T27] kauditd_printk_skb: 2 callbacks suppressed
[  476.601334][   T27] audit: type=1804 audit(1593747133.111:204): pid=21018 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/313/file0/bus" dev="loop0" ino=120 res=1
[  476.638266][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:13 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:13 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25)

[  476.812852][T21035] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  476.864661][   T27] audit: type=1804 audit(1593747133.371:205): pid=21035 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/314/file0/bus" dev="loop0" ino=121 res=1
[  476.929219][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:13 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf000000}, 0x1c)

03:32:13 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900000000000000)

03:32:13 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe0000)

03:32:13 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, 0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:13 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c)

03:32:13 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  477.491043][T21055] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000)

03:32:14 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300)

03:32:14 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00000000000000)

[  477.629862][   T27] audit: type=1804 audit(1593747134.141:206): pid=21055 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/315/file0/bus" dev="loop0" ino=122 res=1
03:32:14 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:14 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, 0x0, 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000)

[  477.741390][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  477.853938][T21084] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  477.920471][   T27] audit: type=1804 audit(1593747134.431:207): pid=21084 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/316/file0/bus" dev="loop0" ino=123 res=1
[  477.949697][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:14 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x12903da4}, 0x1c)

03:32:14 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500)

03:32:14 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00000000000000)

03:32:14 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x34000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:14 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000)

03:32:14 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0), 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:15 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000000)

03:32:15 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600)

03:32:15 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00000000000000)

[  478.541515][T21103] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  478.607379][   T27] audit: type=1804 audit(1593747135.111:208): pid=21103 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/317/file0/bus" dev="loop0" ino=124 res=1
03:32:15 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700)

03:32:15 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x400300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:15 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000)

[  478.734378][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:15 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x18020000}, 0x1c)

03:32:15 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0), 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:15 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900)

03:32:15 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00000000000000)

03:32:15 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5000000)

03:32:15 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  479.463935][T21141] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:16 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00000000000000)

03:32:16 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000)

03:32:16 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00)

03:32:16 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:16 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000000)

[  479.633358][   T27] audit: type=1804 audit(1593747136.141:209): pid=21150 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/318/bus" dev="sda1" ino=16366 res=1
03:32:16 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0), 0x0)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  479.785607][   T27] audit: type=1804 audit(1593747136.171:210): pid=21141 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/318/bus" dev="sda1" ino=16366 res=1
[  479.875381][T21166] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  479.972494][   T27] audit: type=1804 audit(1593747136.481:211): pid=21166 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/319/file0/bus" dev="sda1" ino=16368 res=1
03:32:16 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x20000000}, 0x1c)

03:32:16 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7000000)

03:32:16 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00)

03:32:16 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:16 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{0x0}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:16 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100000000000000)

03:32:16 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000)

[  480.436306][T21183] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9000000)

03:32:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000)

[  480.510040][   T27] audit: type=1804 audit(1593747137.021:212): pid=21183 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/320/file0/bus" dev="loop0" ino=125 res=1
03:32:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb000000)

03:32:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200000000000000)

03:32:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:17 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x2d502a37}, 0x1c)

03:32:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000)

03:32:17 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00)

03:32:17 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{0x0}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  480.665153][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500000000000000)

03:32:17 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd000000)

[  480.807502][T21219] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00000000000000)

03:32:17 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00)

03:32:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xffffffffffffffff)

03:32:17 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40c580)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x4, 0x9, 0x0, 0x1d, "007bc247cbd5692e69613c77872eaf6bfaf4b609a631e83aa966d739b89aa3c165f8f8656269dde6133eee6cc7898ca87bc156b39fe97600", "dbbc2ce61adf35fc7e47afe3b8f11cbe01dc00", [0x5, 0x80000005]})
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
ppoll(&(0x7f0000000180)=[{r3, 0x9000}, {r1}, {r1, 0x8064}], 0x3, &(0x7f00000001c0), &(0x7f0000000200)={[0x5]}, 0x8)

[  480.959478][   T27] audit: type=1804 audit(1593747137.471:213): pid=21219 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/321/file0/bus" dev="sda1" ino=16375 res=1
03:32:17 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000)

03:32:18 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x372a502d}, 0x1c)

03:32:18 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:18 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{0x0}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:18 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf000000)

03:32:18 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00)

03:32:18 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000)

03:32:18 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100)

[  481.753922][T21259] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:18 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:18 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  481.839081][   T27] kauditd_printk_skb: 1 callbacks suppressed
[  481.839092][   T27] audit: type=1804 audit(1593747138.341:215): pid=21259 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/322/file0/bus" dev="loop0" ino=126 res=1
03:32:18 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11000000)

[  481.911411][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:18 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200)

03:32:18 executing program 1:
r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2)
pipe(&(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0xf000000, 0x400, 0x8, r1, 0x0, &(0x7f00000000c0)={0x9b0907, 0x3, [], @string=&(0x7f0000000080)=0x6}})
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = dup2(r2, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$packet(0x11, 0x3, 0x300)
r5 = dup2(r4, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
r6 = socket$packet(0x11, 0x3, 0x300)
r7 = dup2(r6, r6)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r7, r5, 0x9}, 0x10)
ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f00000001c0)={0x0, r5})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$SG_SET_FORCE_PACK_ID(r8, 0x227b, &(0x7f0000000200))
r9 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r9, 0x127d, &(0x7f0000000140))

[  482.098780][T21283] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  482.175958][   T27] audit: type=1804 audit(1593747138.681:216): pid=21283 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/323/file0/bus" dev="loop0" ino=127 res=1
[  482.214451][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:19 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x40000000}, 0x1c)

03:32:19 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12000000)

03:32:19 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500)

03:32:19 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:19 executing program 1:
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x8000, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000180))
fallocate(r0, 0x0, 0x6, 0x0)
r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x44403, 0x0)
setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x8000)
ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140))
r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000200)={r5})
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40, 0x0)
ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f00000000c0)={0x400, 0x50e, 0x1, 0x9, 0x3, 0x38})

[  482.723046][T21307] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:19 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f00)

03:32:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x13000000)

03:32:19 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:19 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7fffffff, 0x302c2)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1)
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
fcntl$addseals(r2, 0x409, 0x4)

[  482.921234][   T27] audit: type=1804 audit(1593747139.431:217): pid=21307 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/324/file0/bus" dev="sda1" ino=16375 res=1
03:32:19 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x14000000)

03:32:19 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  483.134861][T21340] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  483.161878][   T27] audit: type=1804 audit(1593747139.671:218): pid=21340 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/325/file0/bus" dev="loop0" ino=128 res=1
[  483.210117][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x41020000}, 0x1c)

03:32:20 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00)

03:32:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:20 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(0x0, 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:20 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x15000000)

03:32:20 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x16000000)

[  483.599518][T21353] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:20 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(0x0, 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:20 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x17000000)

03:32:20 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  483.679155][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:20 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000))

03:32:20 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000)

03:32:20 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x18000000)

[  483.839287][T21372] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  483.905798][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:21 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x54000000}, 0x1c)

03:32:21 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(0x0, 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x19000000)

03:32:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:21 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000)

03:32:21 executing program 1:
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa)
getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc)
ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140))

03:32:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a000000)

[  484.568370][T21396] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:21 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b000000)

03:32:21 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3000000)

[  484.648244][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:21 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:21 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c000000)

[  484.802177][T21419] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  484.908468][   T27] audit: type=1804 audit(1593747141.411:219): pid=21419 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/329/file0/bus" dev="loop0" ino=132 res=1
[  484.986699][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:22 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x58000000}, 0x1c)

03:32:22 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0x0)
socket$packet(0x11, 0x3, 0x300)
r0 = socket$packet(0x11, 0x3, 0x300)
dup2(r0, r0)
r1 = socket$packet(0x11, 0x3, 0x300)
dup2(r1, r1)
r2 = socket$packet(0x11, 0x3, 0x300)
r3 = dup2(r2, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
r4 = socket$packet(0x11, 0x3, 0x300)
r5 = dup2(r4, r4)
r6 = dup2(r5, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000100)={0xffffffffffffff78, &(0x7f0000000180)=""/136})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xfffa)
r8 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0xe, 0x7, 0x84, 0x20, 0x0, 0x3, 0x300, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x5c48, 0x8000000000000200}, 0x800, 0x2, 0x401, 0x3, 0x10001, 0x4ab8, 0x4}, 0x0, 0xf, r7, 0x3)
ioctl$FS_IOC_GETFLAGS(r8, 0x80086601, &(0x7f0000000000))
r9 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r9, 0x127d, &(0x7f0000000140))

03:32:22 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000)

03:32:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d000000)

03:32:22 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:22 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e000000)

03:32:22 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5000000)

[  485.582719][T21444] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:22 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:22 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1f000000)

[  485.664236][   T27] audit: type=1804 audit(1593747142.171:220): pid=21444 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/330/file0/bus" dev="loop0" ino=133 res=1
[  485.702580][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x20000000)

[  485.887286][T21467] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  485.953358][   T27] audit: type=1804 audit(1593747142.461:221): pid=21467 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/331/file0/bus" dev="loop0" ino=134 res=1
[  485.977118][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:22 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x8dffffff}, 0x1c)

03:32:22 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x21000000)

03:32:22 executing program 1:
r0 = socket$packet(0x11, 0x3, 0x300)
dup2(r0, r0)
r1 = socket(0x11, 0x800000003, 0x0)
bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14)
r3 = socket(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x0, 0x0, 0x5}}}}]}, 0x78}}, 0x0)
recvfrom$packet(r0, &(0x7f0000000180)=""/197, 0xc5, 0x40000100, &(0x7f0000000100)={0x11, 0x1b, r2, 0x1, 0x4, 0x6, @remote}, 0x14)
r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000140))
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x11, 0x1, 0x7, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x20)
r5 = socket$packet(0x11, 0x3, 0x300)
r6 = dup2(r5, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000000)={0x9, 0x0, 0x9, 0x0, 0x20, 0xc1, 0x3, 0x88, 0xa8, 0x2, 0x0, 0x3, 0x1}, 0xe)

03:32:22 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000)

03:32:22 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:22 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x22000000)

[  486.514739][T21483] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:23 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x7000000)

03:32:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x23000000)

[  486.593955][   T27] audit: type=1804 audit(1593747143.101:222): pid=21483 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/332/file0/bus" dev="loop0" ino=135 res=1
03:32:23 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, 0x0, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x24000000)

[  486.702765][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  486.874768][T21510] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  486.933588][   T27] audit: type=1804 audit(1593747143.441:223): pid=21510 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/333/file0/bus" dev="loop0" ino=136 res=1
[  486.990092][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:23 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0x91ffffff}, 0x1c)

03:32:23 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:23 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000)

03:32:23 executing program 1:
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xbd, 0x2, 0xc1, "04fe0979fa8bda6677b46983e7508f78", "7e0f8f7e7195074cd5a22abe3f60487928cb7f30bd138e17809624e577f29579c011b83da3f08c57086b682c27cd20c12d69c3a87f5b96a71b90628caf9e40a2909bd638d8dc38fe27718b663a8f9e46bfa3d6c5d755d8369427ce64b4fed8259f95ae41945897630eb2ed3a82175a9fdfc7926daf9363c3d2bed779acd64a7a2aabcec85e4133135b69957fc9697de5b1891813a08bbd8a3c291e028325ddccc0e7e8de21ae6552"}, 0xbd, 0x2)

03:32:23 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25000000)

03:32:23 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, 0x0, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:24 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x26000000)

[  487.518079][T21530] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:24 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x9000000)

03:32:24 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x25000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:24 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000)

[  487.698828][   T27] audit: type=1804 audit(1593747144.201:224): pid=21540 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/334/bus" dev="sda1" ino=16375 res=1
03:32:24 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, 0x0, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:24 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x27000000)

[  487.764957][   T27] audit: type=1804 audit(1593747144.211:225): pid=21530 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/334/bus" dev="sda1" ino=16375 res=1
[  487.906435][   T27] audit: type=1804 audit(1593747144.411:226): pid=21555 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/335/bus" dev="sda1" ino=16376 res=1
03:32:24 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xa43d9012}, 0x1c)

03:32:24 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb000000)

03:32:24 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x39010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:24 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x28000000)

03:32:24 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:24 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x83)

03:32:25 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x35af804b, 0x50302)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040))
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
accept4$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x800)

[  488.466608][T21577] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:25 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000)

03:32:25 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x29000000)

03:32:25 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:25 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2a000000)

[  488.598219][   T27] audit: type=1804 audit(1593747145.101:227): pid=21577 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/336/file0/bus" dev="loop0" ino=137 res=1
03:32:25 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd000000)

[  488.708583][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:25 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xb8040000}, 0x1c)

03:32:25 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2b000000)

03:32:25 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:25 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000)

03:32:25 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  489.455127][T21616] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:26 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2c000000)

03:32:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000)

03:32:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  489.622756][   T27] audit: type=1804 audit(1593747146.131:228): pid=21616 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/337/file0/bus" dev="sda1" ino=16366 res=1
03:32:26 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xc4ff0000}, 0x1c)

03:32:26 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r4, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2d000000)

03:32:26 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffbffff, 0x345282)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x11000000)

03:32:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  489.870650][T21647] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:26 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x3a1100, 0x0)
ioctl$USBDEVFS_DISCSIGNAL(r1, 0x8010550e, &(0x7f0000000100)={0x9, &(0x7f0000000080)="c6cc4b546934d1f835c5aa8f36fa912730894ffe814cfdcae8334056ed3a1ad9d7666cd3bf1fc1f56cdbb892ee10d841acca7f838fe276038c2477e7184ae438c4c22d1c17c36ebc65477e89168aaeebf1d096dede150bd67181101266186ea007a3ba06a2688d90cbc82cfca2ae9c59c27afb4b76cd166bc1ab484eec9a"})
r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x84800, 0x0)
getpeername$qrtr(r2, &(0x7f00000001c0), &(0x7f0000000200)=0xc)
ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000240)={0xffffff01, 0x2, "ba089f7831621a5c5ea89b6cd06ec2b7aa94398078e6159932c61d65079d29a1", 0x100, 0x7d7c, 0xa9d, 0x4, 0x226})
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  490.012821][   T27] audit: type=1804 audit(1593747146.511:229): pid=21647 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/338/file0/bus" dev="loop0" ino=138 res=1
03:32:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2e000000)

03:32:26 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x12000000)

03:32:26 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2f000000)

03:32:26 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88470000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:26 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  490.197840][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  490.315694][   T27] audit: type=1804 audit(1593747146.821:230): pid=21673 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/339/bus" dev="sda1" ino=15812 res=1
03:32:27 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xc4ffffff}, 0x1c)

03:32:27 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x30000000)

03:32:27 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2)

03:32:27 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x25000000)

03:32:27 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:27 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88480000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:27 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x31000000)

[  490.791095][T21689] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:27 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x48202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1132})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r2 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r3, &(0x7f0000000200), 0x400c00)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000000)=0x3)

03:32:27 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, 0x0, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:27 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f000000)

03:32:27 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  490.871232][   T27] audit: type=1804 audit(1593747147.381:231): pid=21689 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/340/file0/bus" dev="loop0" ino=139 res=1
[  490.907093][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:27 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x32000000)

[  491.136240][T21710] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  491.217068][   T27] audit: type=1804 audit(1593747147.721:232): pid=21710 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/341/file0/bus" dev="loop0" ino=140 res=1
[  491.246692][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:28 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe02e0000}, 0x1c)

03:32:28 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c000000)

03:32:28 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:28 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x33000000)

03:32:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:28 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:28 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x34000000)

03:32:28 executing program 1:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)

03:32:28 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000)

[  491.775639][T21733] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:28 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xefffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:28 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000000000000)

03:32:28 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x35000000)

[  492.048777][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:29 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe0ffffff}, 0x1c)

03:32:29 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:29 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffa)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:29 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:29 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x200000000000000)

03:32:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x36000000)

03:32:29 executing program 1:
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000690003080000001aa903fb7f0000008000000000080001"], 0x20}}, 0x0)
r0 = socket(0x10, 0x80002, 0x0)
sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x440400)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:32:29 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300000000000000)

[  492.734628][T21776] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x37000000)

03:32:29 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:29 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x38000000)

[  492.902371][   T27] kauditd_printk_skb: 1 callbacks suppressed
[  492.902382][   T27] audit: type=1804 audit(1593747149.411:234): pid=21776 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/343/file0/bus" dev="loop0" ino=142 res=1
03:32:29 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  493.020906][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  493.154085][T21802] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  493.230051][   T27] audit: type=1804 audit(1593747149.741:235): pid=21802 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/344/file0/bus" dev="loop0" ino=143 res=1
[  493.271187][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:30 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xe8030000}, 0x1c)

03:32:30 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x400000000000000)

03:32:30 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x39000000)

03:32:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:30 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket$packet(0x11, 0x3, 0x300)
r6 = dup2(r5, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
splice(r6, 0x0, r2, 0x0, 0x1, 0x0)
pipe(&(0x7f0000000140)={<r7=>0xffffffffffffffff})
r8 = socket$nl_route(0x10, 0x3, 0x0)
splice(r7, 0x0, r8, 0x0, 0x1420000a7a, 0x0)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r9=>0xffffffffffffffff})
write$binfmt_elf64(r9, &(0x7f0000000000)=ANY=[], 0xfffa)
r10 = socket$packet(0x11, 0x3, 0x300)
dup2(r10, r10)
ioctl$sock_inet_SIOCSIFNETMASK(r10, 0x891c, &(0x7f0000000080)={'virt_wifi0\x00', {0x2, 0x4e21, @empty}})
ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000))

03:32:30 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:30 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3a000000)

[  493.673266][T21822] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:30 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500000000000000)

03:32:30 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3b000000)

03:32:30 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  493.856073][   T27] audit: type=1804 audit(1593747150.361:236): pid=21822 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/345/file0/bus" dev="loop0" ino=144 res=1
03:32:30 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600000000000000)

03:32:30 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  493.987524][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  494.137621][   T27] audit: type=1804 audit(1593747150.641:237): pid=21850 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/346/bus" dev="sda1" ino=16371 res=1
03:32:31 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf4010000}, 0x1c)

03:32:31 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3c000000)

03:32:31 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700000000000000)

03:32:31 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, 0x0)
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:31 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:31 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3d000000)

03:32:31 executing program 1:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = dup2(r1, 0xffffffffffffffff)
ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x11, 0x28, 0x8, 0x2, 0xb, 0x7, 0x5, 0xf5, 0x1}})
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
r5 = socket$packet(0x11, 0x3, 0x300)
r6 = dup2(r5, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000240)={0x9, &(0x7f00000001c0)=[{0x1f, 0x8, 0x1f, 0x7}, {0x5, 0x3, 0x4}, {0x0, 0x8, 0x1f, 0x800}, {0x8, 0x81, 0x80}, {0xffc0, 0xf, 0x7f, 0x3c}, {0x1000, 0x3, 0x5, 0x1000000}, {0x0, 0x1, 0x4, 0x7fff}, {0x34, 0x8, 0xfe, 0xfffffffe}, {0x100, 0x4, 0xa7, 0x2}]})
ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)=""/254)
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
r7 = socket$packet(0x11, 0x3, 0x300)
r8 = dup2(r7, r7)
ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200)
ioctl$VIDIOC_TRY_ENCODER_CMD(r8, 0xc028564e, &(0x7f0000000180)={0x2, 0x1, [0x1, 0x2, 0x3f, 0x1000, 0x5, 0x9, 0xfff, 0x7fff]})

[  494.649476][T21865] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:31 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x0, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:31 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x800000000000000)

[  494.717685][   T27] audit: type=1804 audit(1593747151.221:238): pid=21865 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/347/file0/bus" dev="loop0" ino=145 res=1
[  494.782165][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:31 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3e000000)

03:32:31 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:31 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900000000000000)

[  494.927909][T21885] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  495.014025][   T27] audit: type=1804 audit(1593747151.521:239): pid=21885 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/348/file0/bus" dev="loop0" ino=146 res=1
[  495.114980][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xf5ffffff}, 0x1c)

03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f000000)

03:32:32 executing program 1:
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa)
setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000)=0x93, 0x4)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:32:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffef}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00000000000000)

03:32:32 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x0, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x40000000)

03:32:32 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4)
fcntl$getflags(r0, 0x401)

[  495.621781][T21912] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c000000)

03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf0ffffff)

03:32:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00000000000000)

03:32:32 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x0, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  495.760341][   T27] audit: type=1804 audit(1593747152.271:240): pid=21912 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/349/file0/bus" dev="loop0" ino=147 res=1
[  495.788768][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:32 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfc000000}, 0x1c)

03:32:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xfffffff0)

03:32:32 executing program 1:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000000c0)={0xd, "43cbea396b77c73a63935a9994"})
ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080))
r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xf9e, 0x0)
ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000140)=0x2)
prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20)

03:32:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00000000000000)

[  495.937385][T21943] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000)

03:32:32 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  496.026683][   T27] audit: type=1804 audit(1593747152.531:241): pid=21943 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/350/file0/bus" dev="loop0" ino=148 res=1
[  496.058826][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000000000)

03:32:32 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00000000000000)

03:32:32 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x4000000000000)

03:32:32 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  496.238748][T21964] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  496.339881][   T27] audit: type=1804 audit(1593747152.851:242): pid=21964 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/351/file0/bus" dev="loop0" ino=149 res=1
[  496.389008][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:33 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfe800000}, 0x1c)

03:32:33 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:33 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x6000000000000)

[  496.880012][T21983] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:33 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x4c4081)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000))
ioctl$LOOP_SET_CAPACITY(r0, 0x4c07)

03:32:33 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00000000000000)

03:32:33 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:33 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x8000000000000)

[  497.005498][   T27] audit: type=1804 audit(1593747153.511:243): pid=21983 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/352/file0/bus" dev="loop0" ino=150 res=1
03:32:33 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa000000000000)

03:32:33 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000000)

03:32:33 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x6b, 0x0, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c7e761ea64030a937fe3e176ffe2614b7b2ff54ce1fec8228486d049a632fdb438a2e21dcf66f3a5b2e7cbd676e2739fc5639facfe2"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:33 executing program 1:
ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, &(0x7f0000000000)=0x73)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x400, 0x0)

[  497.105556][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:33 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  497.308419][T22017] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  497.410447][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:34 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfe80ffff}, 0x1c)

03:32:34 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc000000000000)

03:32:34 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100000000000000)

03:32:34 executing program 1:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffa)
r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x80100, 0x0)
ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000100)=0x2)
fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0))
getsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000), &(0x7f0000000080)=0x4)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0xfffa)
r6 = socket$packet(0x11, 0x3, 0x300)
r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00')
sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r7, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004001}, 0x4040000)
dup2(r6, r6)
fcntl$dupfd(r5, 0x0, r6)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r8=>0xffffffffffffffff})
write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$BINDER_SET_CONTEXT_MGR(r8, 0x40046207, 0x0)

03:32:34 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:34 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:34 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe000000000000)

[  497.874664][T22038] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:34 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200000000000000)

03:32:34 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x10000000000000)

03:32:34 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  497.991661][   T27] kauditd_printk_skb: 1 callbacks suppressed
[  497.991672][   T27] audit: type=1804 audit(1593747154.501:245): pid=22038 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/354/file0/bus" dev="loop0" ino=152 res=1
03:32:34 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  498.088515][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:34 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2500000000000000)

[  498.217008][   T27] audit: type=1804 audit(1593747154.721:246): pid=22061 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/355/bus" dev="sda1" ino=16371 res=1
03:32:35 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xfec0ffff}, 0x1c)

03:32:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x100000000000000)

03:32:35 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:35 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:35 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3f00000000000000)

03:32:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x200000000000000)

03:32:35 executing program 1:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
write$vhost_msg_v2(r0, &(0x7f00000003c0)={0x2, 0x0, {&(0x7f0000000040)=""/87, 0x57, &(0x7f00000000c0)=""/66, 0x2}}, 0x48)
r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffffffc, 0x470000)
ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140))
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000180)={0x0, 0x0, @ioapic})

03:32:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x300000000000000)

03:32:35 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  498.927831][T22089] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x400000000000000)

03:32:35 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x5c00000000000000)

[  499.024736][   T27] audit: type=1804 audit(1593747155.531:247): pid=22089 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/356/file0/bus" dev="loop0" ino=153 res=1
03:32:35 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x500000000000000)

[  499.117627][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:36 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff000000}, 0x1c)

03:32:36 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:36 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x36, r5, [], "1b2e2c278a6b723acdb8b3ad71599086882ab4d6a65bae152757e12d1f42b95f902ba5b68868b2ae52d866587f1e2bbb8ad41576870c"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:36 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x600000000000000)

03:32:36 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
r0 = msgget(0x0, 0x280)
msgctl$IPC_RMID(r0, 0x0)
msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000080)=""/177)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:32:36 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x6, 0x0, 0x200, 0x1, 0x1, 0x8, 0x19, "91a64cd65a4efc20cb55d04731058dd3bed3e534", "30d079015928e3f1bacbfe500f8046157142d64c"})
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x3)

03:32:36 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x700000000000000)

[  499.773146][T22124] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:36 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:36 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x800000000000000)

03:32:36 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000180)=""/181)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x10080)
fchdir(0xffffffffffffffff)
ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x980000, 0x4, 0x72, <r4=>0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9909c9, 0x40, [], @p_u32=&(0x7f0000000000)=0x8}})
ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000140))

[  499.841326][   T27] audit: type=1804 audit(1593747156.351:248): pid=22124 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/357/file0/bus" dev="loop0" ino=154 res=1
[  499.868629][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:36 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:36 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x900000000000000)

[  500.051222][T22146] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  500.097607][   T27] audit: type=1804 audit(1593747156.601:249): pid=22146 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/358/file0/bus" dev="loop0" ino=155 res=1
[  500.153347][  T310] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:37 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xff0f0000}, 0x1c)

03:32:37 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
clone(0x30850800, &(0x7f0000000080)="7b2aea9c69dde82e30c3095baff3bac06c8abc43c28e3dec2f7e61e1a6f748f76988b7d3bc093d637b038a5fdd89da4bb8a6ea553161235403d5b837237a04f04f4f410f2e7820d2441119cca025576aa7833213bd08d6d6a9b5f024a6ad16d3070c5aab41ee8aa5e5cc9c7a2da5fdcd5704a3aaca89cf22ffe11ad605ecbdc3f50482912d213323ef788b9b7a", &(0x7f0000000000), &(0x7f0000000180), &(0x7f00000001c0)="806b880e7c7665330d0776e40e88daa020420a40bf9a23ea40da06d998779404ed88264efad515d527adba71436d6b166fda8d94a39624fd3a76c22680df57ad9c8d40157d02453891264b6698cba96f6f93fdd82ad48cfee70018bfeabb4e29eb2fb690d4abd291ab699487fd083cb429caa8e38de277eb22277195422e3d15179c82c4572167b4556d6d067237d973c5b6488f1183fd0fc125213f726f2366c53ae644944be07b3931c7af61ec603056b879e106")

03:32:37 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:37 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xa00000000000000)

03:32:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:37 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xb00000000000000)

03:32:37 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000))

[  500.791791][   T27] audit: type=1804 audit(1593747157.301:250): pid=22164 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/359/bus" dev="sda1" ino=16366 res=1
03:32:37 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

03:32:37 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:37 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xc00000000000000)

[  500.955367][T22182] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:37 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
getsockname$packet(r1, &(0x7f0000000280), &(0x7f00000002c0)=0xc)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x10002)
ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000240)={0x5, 0x5})
ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000200)={0x980000, 0x3, 0xfc, r1, 0x0, &(0x7f00000001c0)={0xa20929, 0xe5, [], @p_u8=&(0x7f0000000180)=0x6}})
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x6, 0x9, 0x1e, 0x14, "8a52db6daa3a34fac4979f0856bd97bfef35f8df316628abf30b53493e90ab59f07af0e4f5ca92c10d3e7b2af3d06e8e34efebc6e2a1326661184ae09f4de39b", "b7527a1fe6ca0d667535929b620d217b58d097867638b8473a0e7d1599b55241", [0x1d7b, 0x4]})

03:32:37 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x0, r5})
sendfile(r1, r3, 0x0, 0x8400fffffffb)

[  501.042778][   T27] audit: type=1804 audit(1593747157.551:251): pid=22182 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/360/file0/bus" dev="loop0" ino=156 res=1
[  501.072448][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  501.234884][   T27] audit: type=1804 audit(1593747157.741:252): pid=22192 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/361/bus" dev="sda1" ino=16375 res=1
03:32:38 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffff0000}, 0x1c)

03:32:38 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0xa8380, 0x0)
getresuid(&(0x7f00000003c0), &(0x7f0000000440)=<r4=>0x0, &(0x7f00000004c0))
ioctl$SIOCAX25DELUID(r3, 0x89e2, &(0x7f0000000500)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4})
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x9c0000, 0x8, 0x9, <r5=>r1, 0x0, &(0x7f0000000080)={0x3b0920, 0xfffffff7, [], @p_u8=&(0x7f0000000000)=0xc1}})
r6 = socket$nl_generic(0x10, 0x3, 0x10)
r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000480)='devlink\x00')
r8 = gettid()
sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000800)={0x0, 0x9, &(0x7f0000000400)={&(0x7f0000000000)={0x3c, r7, 0x536ae464467e3e0b, 0x5000000, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}]}, 0x3c}}, 0x0)
sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r7, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x801}, 0x4851)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xd00000000000000)

03:32:38 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:38 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r4, [], "1b"})
sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb)

03:32:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xe00000000000000)

[  501.758246][   T27] audit: type=1804 audit(1593747158.261:253): pid=22206 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/362/bus" dev="sda1" ino=16366 res=1
03:32:38 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:38 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r4, [], "1b"})
sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb)

03:32:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0xf00000000000000)

[  502.000582][   T27] audit: type=1804 audit(1593747158.511:254): pid=22218 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/363/bus" dev="sda1" ino=16368 res=1
03:32:38 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
creat(&(0x7f0000000280)='./bus\x00', 0x1)
r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r4 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r3)
keyctl$read(0xb, r4, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r4, [], "1b"})
sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffb)

03:32:38 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1000000000000000)

03:32:38 executing program 1:
syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x181000)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
r4 = dup2(r3, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
pipe(&(0x7f0000000140)={<r5=>0xffffffffffffffff})
r6 = socket$nl_generic(0x10, 0x3, 0x10)
r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00')
ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000000280)={0x4, "d1ec42fd24ff22c0955a8aa0e902366c1385e0be115ea6c98eab37a4c96807d5", 0x2, 0x4, 0x3, 0x2000000, 0x2000001, 0x2})
r8 = socket$inet6_icmp(0xa, 0x2, 0x3a)
readahead(r8, 0x5, 0x7)
sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000708df88e08ba78eaae80f31ebb34adb433ef71d2cf08be649620edf839118e10be6e4ffa3134cf047db0789bf28a4af1d59bd2db1e8ea93de540afa35600000000000000", @ANYRES16=r7, @ANYBLOB="010000000000000000000a0000000800048004000a80"], 0x1c}}, 0x0)
sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xc8, r7, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}]}, @TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3b6d32f9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x4008016)
r9 = socket$nl_route(0x10, 0x3, 0x0)
splice(r5, 0x0, r9, 0x0, 0x1420000a7a, 0x0)
ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000140)=0x9)

03:32:39 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffff80fe}, 0x1c)

03:32:40 executing program 2:
r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull\x00', 0x80, 0x0)
ioctl$KDSETLED(r0, 0x4b32, 0x3)
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000006c0)={0x1cf, 0x11, &(0x7f00000002c0)="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"})
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000140)={<r1=>0xffffffffffffffff})
r2 = socket$nl_route(0x10, 0x3, 0x0)
splice(r1, 0x0, r2, 0x0, 0x1420000a7a, 0x0)
flock(r2, 0xb)
mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000001)
r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffa)
sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, 0x140b, 0x10, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x58}}, 0x4000)
getsockname$llc(r4, &(0x7f0000000080), &(0x7f00000000c0)=0x10)
openat$smackfs_syslog(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/syslog\x00', 0x2, 0x0)
ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000140))

03:32:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1100000000000000)

03:32:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:40 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb)

03:32:40 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x40202)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000180)=0x200)
ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000080)=0x2)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
r2 = msgget(0x0, 0x280)
msgctl$IPC_RMID(r2, 0x0)
r3 = socket$inet_sctp(0x2, 0x5, 0x84)
r4 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0x10)
r5 = socket$inet_sctp(0x2, 0x1, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={<r6=>0x0}, &(0x7f0000000100)=0x21)
setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x11, &(0x7f0000000040)=@assoc_value={r6}, 0x8)
getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r6, &(0x7f0000000100)=0x4)
msgctl$IPC_RMID(r2, 0x0)

03:32:40 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffc0fe}, 0x1c)

03:32:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1200000000000000)

[  503.648097][T22292] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1300000000000000)

[  503.705928][T22298] sctp: [Deprecated]: syz-executor.1 (pid 22298) Use of int in maxseg socket option.
[  503.705928][T22298] Use struct sctp_assoc_value instead
03:32:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1400000000000000)

03:32:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1500000000000000)

[  503.792022][   T27] kauditd_printk_skb: 1 callbacks suppressed
[  503.792032][   T27] audit: type=1804 audit(1593747160.301:256): pid=22292 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/365/file0/bus" dev="sda1" ino=16364 res=1
03:32:40 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:40 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1600000000000000)

[  504.432634][T22298] sctp: [Deprecated]: syz-executor.1 (pid 22298) Use of int in maxseg socket option.
[  504.432634][T22298] Use struct sctp_assoc_value instead
03:32:41 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0xa004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1700000000000000)

03:32:41 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb)

03:32:41 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:41 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))
lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0})
socket$inet_tcp(0x2, 0x1, 0x0)
fchown(r0, r1, r2)

03:32:41 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffff8d}, 0x1c)

[  504.698720][T22335] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1800000000000000)

03:32:41 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x44402)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

03:32:41 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  504.808009][   T27] audit: type=1804 audit(1593747161.311:257): pid=22344 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/366/file0/bus" dev="loop0" ino=157 res=1
03:32:41 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffb)

03:32:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1900000000000000)

[  504.915080][  T289] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1a00000000000000)

03:32:41 executing program 1:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0xa600, 0x0)
r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00')
sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004855}, 0x20040000)
sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r3, 0x1, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x40000)
pipe(&(0x7f0000000140)={<r4=>0xffffffffffffffff})
r5 = socket$nl_route(0x10, 0x3, 0x0)
splice(r4, 0x0, r5, 0x0, 0x1420000a7a, 0x0)
setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000000)={0x7, [0x6ac, 0x8001, 0x4, 0xfd0a, 0x1000, 0x200, 0x4]}, 0x12)
r6 = syz_usb_connect(0x0, 0x24, &(0x7f0000000380)=ANY=[], 0x0)
syz_usb_control_io(r6, 0x0, 0x0)
syz_usb_control_io(r6, &(0x7f00000002c0)={0x2c, &(0x7f0000000140)={0x0, 0x0, 0x8, {0x8, 0x0, "33c8fd41c1e6"}}, 0x0, 0x0, 0x0, 0x0}, 0x0)
syz_usb_ep_write$ath9k_ep1(r6, 0x82, 0xf0, &(0x7f0000000180)={[{0xeb, 0x4e00, "6e1a1ca3feb01eaf6ad4c641e038ebfd508cd9fd84da2592e5fb60c1726423080adbd31633731e9fe9be2e423a619702a39108d3352927437ce2f3c93748d7e7fc024d77e423be75ce274c5e62c72a48afe2fb2d807c50ba9e795fb728a5ee34390b848969e1af604fbc308f3e457bf4c37dad75e489bb5909b2929b07f2449666c526689c75db03be8aa709ed95b48d011ebfbc2db084ad7d774e02f68f270911205088bc32d230c49e048a374bbdd1c1a41e36b30b5c12ccc8fedb44bceb71e5ac9b755afdc9f44194db93fb61bbd6b53fee870c89bd002cc6680dce1ee4fc2c0b23a4ea8d7f5e7061d8"}]})
r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080)={0x1f, @none, 0x8}, 0xa)
ioctl$BLKSECDISCARD(r7, 0x127d, &(0x7f0000000140))
syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2)

03:32:41 executing program 2:
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r0, 0xc0245720, &(0x7f0000000000)={0x1})
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="757466383d312c6e6f6e756d7461696c3d302c696f636861727365743d63ff9870313235352c696f636861727365743d63"])
ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000140))

03:32:41 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  505.150324][   T27] audit: type=1804 audit(1593747161.661:258): pid=22361 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/367/bus" dev="sda1" ino=16369 res=1
03:32:41 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, r3, 0x0, 0x0)

03:32:41 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1b00000000000000)

[  505.294002][T22380] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  505.305702][T22370] FAT-fs (loop2): bogus number of reserved sectors
[  505.317049][T22370] FAT-fs (loop2): Can't find a valid FAT filesystem
[  505.404478][   T27] audit: type=1804 audit(1593747161.911:259): pid=22380 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/368/file0/bus" dev="loop0" ino=158 res=1
[  505.495754][T11021] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  505.539524][   T12] usb 2-1: new high-speed USB device number 51 using dummy_hcd
03:32:42 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffff91}, 0x1c)

03:32:42 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:42 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1c00000000000000)

03:32:42 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x100, 0x0)
r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000580)='NLBL_UNLBL\x00')
sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000fddbde250100000014000300fc020000000000000000000000000000050001000000000014000200fc01000000000000000000000000000108000400ac1414bb"], 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x2404c804)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff})
r3 = socket$nl_route(0x10, 0x3, 0x0)
splice(r2, 0x0, r3, 0x0, 0x1420000a7a, 0x0)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffa)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000700)={0x0, r4, 0x8, 0x7ff, 0x81, 0x100})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x40)
ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r5, 0x40184152, &(0x7f00000004c0)={0x0, &(0x7f0000000480)=[&(0x7f0000000180)="a6411e4cd4998e861f74256ca23d6149c1e4d52121d456f9d9289fcbad5c76cf2027d85c237cc9991b434be0b1ad2da16aa143a16abb8c3b23767f602b8016968613677c3afac32abd52aa5588939d1e8c6a211ed505b82090d8e71e131abf18bac6f958cee45a3908822f2c338ca4cb1e0b16852260dcdc0f7f57cfaec1f9653846c8757be7bddfd611633a42ec77d230f8c78833abaa5e96fa1d7e631d4312cdafcb731f0c7461f61ef0c7bc47d2e95b9d2ceb48ac0847c2c404145c2c98c4a0ff8d12953f0464e6db8d77921b1e4f0b6bcd", &(0x7f0000000080)="4ef7a53468b969b894059d29da51b97c8475a08a1bf7aaa73ce75ffa3ce4559a6cfdacc8c8", &(0x7f00000000c0)="2d396686802df10c63474cb229483cab13c7982347fb3f440a6ef8158de43698782067af22da9fb3f2fc52af9c9b2ef5cd5575ce9c7fb6d2ff7e8adb0e0f7a934b15fb95b4760b2f93d16b5884e3f0218452cc87030d80369844753c7fa0d617af30", &(0x7f0000000280)="049dfe8af5469c863484dad72763946176761fa5623e1d6fa096aa3d59901bfafe81e09db47ed508491674cd50ed71186d1eb10613e91d0c1642f1aece9e44462ef81c344bf240a5b4906aabd697335dc2d05aec1aab5c7d330b3ebd4160aebc707a92862489be233427b46bfab3d40b03b0d7faca9f32efe001d6ed3af7ea8ce72dd48edbde6b478d4116bc6ea8a8eb424927a07f8d01fa5962a3", &(0x7f0000000340)="6f32218bbf351149204b4e97fe089abd298f0889d54a1ca7306bf74e6bcee980e9a08d2592a68a272f42664ca87dab353a6a53c975a26275d683f60112e4db7732c2c3bb15fccc686f613e076e8c5f222d43bc0f3175c551baa26fd9dff52b94eb", &(0x7f00000003c0)="0fbdb8b89aa922de376170150ec3bdd8f3f8631de5673391faa9f84e3cf084f33fb8c1a689fd204dc44ca8fbd4bd65ba0d1bc02bfd3533ca2d0b546454ee5367e2dbc465947394aadf103a39c0621c34b03cc424d95eb9ce4f82659d908b2ca62a93f59ddb88b0bfb009dc4d7734ded0576f95a3e18dd1f5211aa4407b4986ea6db6d0dc026c32cc78a81d32be73bf92d73225d6fbe9aaaa85298a1d731c0b4ebe89969e7ec8b6"], 0x79ef98fd})
r6 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[], 0xfffa)
setsockopt$bt_l2cap_L2CAP_CONNINFO(r7, 0x6, 0x2, &(0x7f00000006c0)={0x3, "7bcbf4"}, 0x6)
ioctl$BLKSECDISCARD(r6, 0x127d, &(0x7f0000000140))

03:32:42 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, r3, 0x0, 0x0)

03:32:42 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1d00000000000000)

[  505.759768][T22401] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  505.808732][   T12] usb 2-1: device descriptor read/64, error 18
03:32:42 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x139}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  505.880621][   T27] audit: type=1804 audit(1593747162.381:260): pid=22401 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir784399692/syzkaller.hWswxt/369/file0/bus" dev="loop0" ino=159 res=1
[  505.965070][    T7] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
[  506.208803][   T12] usb 2-1: device descriptor read/64, error 18
[  506.478730][   T12] usb 2-1: new high-speed USB device number 52 using dummy_hcd
[  506.758783][   T12] usb 2-1: device descriptor read/64, error 18
[  507.148739][   T12] usb 2-1: device descriptor read/64, error 18
[  507.269804][   T12] usb usb2-port1: attempt power cycle
[  507.978758][   T12] usb 2-1: new high-speed USB device number 53 using dummy_hcd
03:32:44 executing program 0:
setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lc\x00', 0x0, 0x1}, {@empty}}, 0x44)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0)
r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x311800)
fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0)
r1 = creat(&(0x7f0000000280)='./bus\x00', 0x1)
r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='./file0\x00')
writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000140)="bf", 0x1}], 0x1)
r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0)
r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
r5 = add_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r4)
keyctl$read(0xb, r5, 0x0, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000003c0)={{0x1, 0x0, @identifier="e22d6edf7c3c95a5479dc5c891077013"}, 0x1, r5, [], "1b"})
sendfile(r1, r3, 0x0, 0x0)

03:32:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1e00000000000000)

03:32:44 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

03:32:44 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c)
setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4)
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = dup2(r1, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr, 0xffffffc4}, 0x1c)

03:32:44 executing program 1:
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
r1 = socket$nl_route(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0x1420000a7a, 0x0)
ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000180)="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", {0x9, 0x5, 0xcd243842, 0x9, 0x400, 0x2, 0x3, 0x80000001}})
r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140))

03:32:44 executing program 2:
add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe)
fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
setuid(r0)
shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil)
keyctl$chown(0x4, 0x0, 0x0, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0)
r2 = gettid()
ptrace$setopts(0x4206, r2, 0x0, 0x0)
r3 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r3)
tkill(r3, 0x3c)
write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7)
ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r2, 0x0, 0x0)
ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000140))

03:32:44 executing program 2:
keyctl$chown(0x4, 0x0, 0xee00, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
fchdir(0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140))

[  508.128793][   T12] usb 2-1: device descriptor read/8, error -71
03:32:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1f00000000000000)

[  508.180618][T22439] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1)
03:32:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2000000000000000)

03:32:44 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2100000000000000)

03:32:44 executing program 4:
r0 = socket$packet(0x11, 0x3, 0x300)
r1 = dup2(r0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}]}, 0x3c}}, 0x0)

[  508.311762][T22439] ------------[ cut here ]------------
[  508.339606][   T12] usb 2-1: device descriptor read/8, error -71
[  508.340200][T22439] kernel BUG at fs/buffer.c:3032!
[  508.361064][T22439] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[  508.367143][T22439] CPU: 1 PID: 22439 Comm: syz-executor.0 Not tainted 5.8.0-rc3-syzkaller #0
[  508.375800][T22439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  508.385856][T22439] RIP: 0010:submit_bh_wbc+0x6b0/0x6d0
[  508.391219][T22439] Code: ff 44 89 e1 80 e1 07 fe c1 38 c1 0f 8c 43 fc ff ff 4c 89 e7 e8 11 a5 e7 ff e9 36 fc ff ff e8 37 a6 a8 ff 0f 0b e8 30 a6 a8 ff <0f> 0b e8 29 a6 a8 ff 0f 0b e8 22 a6 a8 ff 0f 0b e8 1b a6 a8 ff 0f
[  508.410815][T22439] RSP: 0018:ffffc9000d45f8a8 EFLAGS: 00010287
[  508.416871][T22439] RAX: ffffffff81cbd520 RBX: 0000000000000000 RCX: 0000000000040000
[  508.424830][T22439] RDX: ffffc90001909000 RSI: 00000000000020ea RDI: 00000000000020eb
[  508.432815][T22439] RBP: 0000000000000800 R08: ffffffff81cbcf13 R09: ffffed100671faaf
[  508.440805][T22439] R10: ffffed100671faaf R11: 0000000000000000 R12: 0000000000000001
[  508.448769][T22439] R13: ffff8880338fd570 R14: 0000000000000000 R15: dffffc0000000000
[  508.456733][T22439] FS:  00007fe1c2401700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
[  508.465793][T22439] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  508.472731][T22439] CR2: 00000000004e2330 CR3: 0000000088cf2000 CR4: 00000000001426e0
[  508.480728][T22439] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  508.489650][T22439] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  508.497609][T22439] Call Trace:
[  508.500905][T22439]  __sync_dirty_buffer+0x19b/0x2d0
[  508.506027][T22439]  __fat_write_inode+0x6f4/0x890
[  508.510969][T22439]  __writeback_single_inode+0x568/0x630
[  508.516510][T22439]  writeback_single_inode+0x1b1/0x7d0
[  508.521878][T22439]  ? lock_acquire+0x160/0x720
[  508.526548][T22439]  ? sync_mapping_buffers+0x5b0/0xde0
[  508.531944][T22439]  ? __generic_file_fsync+0x96/0x190
[  508.537224][T22439]  sync_inode_metadata+0x6d/0xb0
[  508.542162][T22439]  __generic_file_fsync+0x13c/0x190
[  508.547354][T22439]  fat_file_fsync+0x7a/0x190
[  508.551949][T22439]  generic_file_write_iter+0x599/0x650
[  508.557409][T22439]  do_iter_readv_writev+0x5b7/0x820
[  508.562634][T22439]  do_iter_write+0x16a/0x540
[  508.567221][T22439]  ? __sb_start_write+0x35f/0x410
[  508.572266][T22439]  do_writev+0x23f/0x4a0
[  508.576504][T22439]  ? _copy_to_user+0xca/0x140
[  508.581177][T22439]  ? rcu_read_lock_sched_held+0x2f/0xa0
[  508.586719][T22439]  ? lock_is_held_type+0x87/0xe0
[  508.591654][T22439]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  508.597716][T22439]  do_syscall_64+0x73/0xe0
[  508.602132][T22439]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  508.608017][T22439] RIP: 0033:0x45cb29
[  508.611895][T22439] Code: Bad RIP value.
[  508.615957][T22439] RSP: 002b:00007fe1c2400c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
[  508.624358][T22439] RAX: ffffffffffffffda RBX: 000000000050eee0 RCX: 000000000045cb29
[  508.632343][T22439] RDX: 0000000000000001 RSI: 00000000200001c0 RDI: 0000000000000006
[  508.640306][T22439] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
[  508.648268][T22439] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
03:32:45 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x40202)
ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x2200000000000000)

[  508.656240][T22439] R13: 0000000000000d62 R14: 00000000004cb843 R15: 00007fe1c24016d4
[  508.664204][T22439] Modules linked in:
[  508.797087][T22439] ---[ end trace b4faaf20b1cafd54 ]---
[  508.813559][T22439] RIP: 0010:submit_bh_wbc+0x6b0/0x6d0
[  508.819982][T22439] Code: ff 44 89 e1 80 e1 07 fe c1 38 c1 0f 8c 43 fc ff ff 4c 89 e7 e8 11 a5 e7 ff e9 36 fc ff ff e8 37 a6 a8 ff 0f 0b e8 30 a6 a8 ff <0f> 0b e8 29 a6 a8 ff 0f 0b e8 22 a6 a8 ff 0f 0b e8 1b a6 a8 ff 0f
[  508.840597][T22439] RSP: 0018:ffffc9000d45f8a8 EFLAGS: 00010287
[  508.846852][T22439] RAX: ffffffff81cbd520 RBX: 0000000000000000 RCX: 0000000000040000
[  508.857015][T22439] RDX: ffffc90001909000 RSI: 00000000000020ea RDI: 00000000000020eb
[  508.865880][T22439] RBP: 0000000000000800 R08: ffffffff81cbcf13 R09: ffffed100671faaf
[  508.876164][T22439] R10: ffffed100671faaf R11: 0000000000000000 R12: 0000000000000001
[  508.885053][T22439] R13: ffff8880338fd570 R14: 0000000000000000 R15: dffffc0000000000
[  508.895266][T22439] FS:  00007fe1c2401700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
[  508.905026][T22439] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  508.912669][T22439] CR2: 00007fcc0e1e1000 CR3: 0000000088cf2000 CR4: 00000000001426e0
[  508.924751][T22439] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  508.933419][T22439] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  508.942484][T22439] Kernel panic - not syncing: Fatal exception
[  508.949578][T22439] Kernel Offset: disabled
[  508.953906][T22439] Rebooting in 86400 seconds..